Sciweavers

1630 search results - page 60 / 326
» Secure Overlay Network Design
Sort
View
NOMS
2008
IEEE
115views Communications» more  NOMS 2008»
15 years 4 months ago
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks
—We propose a distributed monitoring scheme for an ad-hoc/MESH network topology, and design a Distributed Hash Table based Peer-to-Peer system to log the topology information. A ...
Cristian Popi, Olivier Festor
MUE
2007
IEEE
106views Multimedia» more  MUE 2007»
15 years 4 months ago
PKTown: A Peer-to-Peer Middleware to Support Multiplayer Online Games
Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...
SIGCOMM
2004
ACM
15 years 3 months ago
The feasibility of supporting large-scale live streaming applications with dynamic application end-points
While application end-point architectures have proven to be viable solutions for large-scale distributed applications such as distributed computing and file-sharing, there is lit...
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. ...
IRI
2006
IEEE
15 years 3 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss