Sciweavers

870 search results - page 31 / 174
» The failure detector abstraction
Sort
View
P2P
2009
IEEE
137views Communications» more  P2P 2009»
15 years 6 months ago
Analysis of Failure Correlation Impact on Peer-to-Peer Storage Systems
Abstract—Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing me...
Olivier Dalle, Frédéric Giroire, Jul...
ASIACRYPT
2005
Springer
15 years 5 months ago
A Failure-Friendly Design Principle for Hash Functions
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
Stefan Lucks
EUROCRYPT
2008
Springer
15 years 1 months ago
Protocols and Lower Bounds for Failure Localization in the Internet
Abstract. A secure failure-localization path-quality-monitoring (FLPQM) protocols allows a sender to localize faulty links on a single path through a network to a receiver, even wh...
Boaz Barak, Sharon Goldberg, David Xiao
ISMIS
2005
Springer
15 years 5 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
VTC
2010
IEEE
130views Communications» more  VTC 2010»
14 years 10 months ago
Receiver Multiuser Diversity Aided Multi-Stage MMSE Multiuser Detection for DS-CDMA and SDMA Systems Employing I-Q Modulation
Abstract— The so-called receiver multiuser diversity aided multistage minimum mean-square error multiuser detector (RMD/MS-MMSE MUD), which was proposed previously by the author,...
Lie-Liang Yang