Sciweavers

2771 search results - page 425 / 555
» Using Computational Reflection in Optimistic Distributed Sim...
Sort
View
SAC
2010
ACM
15 years 9 months ago
Maintaining data reliability without availability in P2P storage systems
Peer-to-peer (P2P) storage is a promising technology to provide users with cheap and online persistence. However, due the instability of these infrastructures, P2P storage systems...
Lluis Pamies-Juarez, Pedro García Ló...
EMMCVPR
2003
Springer
15 years 7 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
138
Voted
ICDCSW
2007
IEEE
15 years 8 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
NDSS
2006
IEEE
15 years 8 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
CAMAD
2006
IEEE
15 years 6 months ago
Ensuring IP services consistency through lightweight monitoring-based admission control
Abstract-- This paper evaluates the performance of a distributed and lightweight AC model based on per-class edge-toedge monitoring feedback for ensuring the quality of multiple se...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas