Sciweavers

1583 search results - page 122 / 317
» The Quorum Deployment Problem
Sort
View
130
Voted
SPW
2005
Springer
15 years 9 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
WDAG
2005
Springer
101views Algorithms» more  WDAG 2005»
15 years 9 months ago
Keeping Denial-of-Service Attackers in the Dark
Abstract. We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with so...
Gal Badishi, Amir Herzberg, Idit Keidar
134
Voted
NETGAMES
2004
ACM
15 years 9 months ago
Scalable peer-to-peer networked virtual environment
We propose a fully-distributed peer-to-peer architecture to solve the scalability problem of Networked Virtual Environment in a simple and efficient manner. Our method exploits lo...
Shun-Yun Hu, Guan-Ming Liao
SENSYS
2004
ACM
15 years 9 months ago
Distributed attention
As distributed surveillance networks are deployed over larger areas and in increasingly busy environments, limiting the computation, bandwidth, and human attention burdens imposed...
Maurice Chu, Patrick Cheung, James Reich
114
Voted
COORDINATION
2004
Springer
15 years 9 months ago
Measuring Component Adaptation
Adapting heterogeneous software components that present mismatching interaction behaviour is one of the crucial problems in Component-Based Software Engineering. The process of com...
Antonio Brogi, Carlos Canal, Ernesto Pimentel