Sciweavers

23988 search results - page 4507 / 4798
» Social Network Computing
Sort
View
KBSE
2007
IEEE
15 years 11 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
LCN
2007
IEEE
15 years 11 months ago
Dynamic Group Membership Management for Distributed Interactive Applications
Abstract—Distributed interactive applications have become increasingly popular, making it important to address their communication needs, where one of the needs is group communic...
Knut-Helge Vik, Carsten Griwodz, Pål Halvors...
LCN
2007
IEEE
15 years 11 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 11 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
QSIC
2007
IEEE
15 years 11 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
« Prev « First page 4507 / 4798 Last » Next »