Sciweavers

441 search results - page 55 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
FIRSTMONDAY
2000
75views more  FIRSTMONDAY 2000»
14 years 11 months ago
Free Riding on Gnutella
An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we e...
Eytan Adar, Bernardo A. Huberman
SRDS
2008
IEEE
15 years 6 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
CEEMAS
2007
Springer
15 years 6 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
JSSPP
2004
Springer
15 years 5 months ago
Are User Runtime Estimates Inherently Inaccurate?
Computer system batch schedulers typically require information from the user upon job submission, including a runtime estimate. Inaccuracy of these runtime estimates, relative to ...
Cynthia Bailey Lee, Yael Schwartzman, Jennifer Har...
CLEIEJ
2008
88views more  CLEIEJ 2008»
14 years 12 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero