Sciweavers

1331 search results - page 131 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
EDCC
2005
Springer
15 years 3 months ago
Structure-Based Resilience Metrics for Service-Oriented Networks
Many governmental agencies and businesses organizations use networked systems to provide a number of services. Such a service-oriented network can be implemented as an overlay on ...
Daniel J. Rosenkrantz, Sanjay Goel, S. S. Ravi, Ja...
INFOCOM
2005
IEEE
15 years 3 months ago
New insights from a fixed point analysis of single cell IEEE 802.11 WLANs
— We study a fixed point formalisation of the well known analysis of Bianchi [3]. We provide a significant simplification and generalisation of the analysis. In this more gene...
Anurag Kumar, Eitan Altman, Daniele Miorandi, Muni...
ICCAD
1996
IEEE
151views Hardware» more  ICCAD 1996»
15 years 2 months ago
Expected current distributions for CMOS circuits
The analysis of CMOS VLSI circuit switching current has become an increasingly important and difficult task from both a VLSI design and simulation software perspective. This paper...
Dennis J. Ciplickas, Ronald A. Rohrer
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 11 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl