Sciweavers

374 search results - page 45 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
DSN
2004
IEEE
15 years 3 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
IMC
2003
ACM
15 years 5 months ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
WIOPT
2010
IEEE
14 years 9 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz
AIMS
2007
Springer
15 years 6 months ago
IBGP Confederation Provisioning
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Mohamed Nassar, Radu State, Olivier Festor
ICDCSW
2007
IEEE
15 years 6 months ago
Towards Fair Event Dissemination
Event dissemination in large scale dynamic systems is typically claimed to be best achieved using decentralized peer-to-peer architectures. The rationale is to have every particip...
Sébastien Baehni, Rachid Guerraoui, Boris K...