Sciweavers

1630 search results - page 44 / 326
» Secure Overlay Network Design
Sort
View
SLIP
2009
ACM
15 years 4 months ago
Is overlay error more important than interconnect variations in double patterning?
Double patterning lithography seems to be a prominent choice for 32nm and 22nm technologies. Double patterning lithography techniques require additional masks for a single interco...
Kwangok Jeong, Andrew B. Kahng, Rasit Onur Topalog...
USS
2004
14 years 11 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
CORR
2008
Springer
145views Education» more  CORR 2008»
14 years 9 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
WWW
2006
ACM
15 years 10 months ago
The SOWES approach to P2P web search using semantic overlays
Peer-to-peer (P2P) Web search has gained a lot of interest lately, due to the salient characteristics of P2P systems, namely scalability, fault-tolerance and load-balancing. Howev...
Christos Doulkeridis, Kjetil Nørvåg, ...
EURONGI
2008
Springer
14 years 11 months ago
Performance Evaluation of Overlay-Based Range Queries in Mobile Systems
Current mobility management systems are operator centralized, and focused on single link technologies. In heterogeneous wireless mesh networks, vertical handovers could be a length...
Amine M. Houyou, Alexander Stenzer, Hermann de Mee...