Sciweavers

1053 search results - page 194 / 211
» The Rules of Virtual Groups
Sort
View
SIGMOD
2007
ACM
159views Database» more  SIGMOD 2007»
15 years 11 months ago
Boosting topic-based publish-subscribe systems with dynamic clustering
We consider in this paper a class of Publish-Subscribe (pub-sub) systems called topic-based systems, where users subscribe to topics and are notified on events that belong to thos...
Tova Milo, Tal Zur, Elad Verbin
ICCSA
2010
Springer
15 years 5 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
IDTRUST
2009
ACM
15 years 5 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 5 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
TRUST
2009
Springer
15 years 5 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi