Sciweavers

3178 search results - page 595 / 636
» Survivability Analysis of Networked Systems
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
INFOCOM
2007
IEEE
15 years 8 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ESORICS
2007
Springer
15 years 8 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ISNN
2007
Springer
15 years 8 months ago
A Connectionist Thematic Grid Predictor for Pre-parsed Natural Language Sentences
Abstract. Inspired on psycholinguistics and neuroscience, a symbolicconnectionist hybrid system called θ-Pred (Thematic Predictor for natural language) is proposed, designed to re...
João Luís Garcia Rosa
AICT
2006
IEEE
163views Communications» more  AICT 2006»
15 years 8 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...