Sciweavers

141 search results - page 17 / 29
» cn 2007
Sort
View
85
Voted
CN
2007
99views more  CN 2007»
14 years 9 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
CN
2007
115views more  CN 2007»
14 years 9 months ago
Parallel overlays for high data-rate multicast data transfer
Recently a number of application-layer multicast (ALM) protocols have been proposed as a promising alternative to deploying multicast services in the unicast-only Internet. Curren...
Ka Ki To, Jack Y. B. Lee
73
Voted
CN
2007
137views more  CN 2007»
14 years 9 months ago
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm
The success of experiences such as Seattle and Houston Wireless has attracted the attention on the so called wireless mesh community networks. These are wireless multihop networks...
Laura Galluccio, Giacomo Morabito, Sergio Palazzo,...
CN
2007
100views more  CN 2007»
14 years 9 months ago
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is br...
Ernst W. Biersack, Damiano Carra, Renato Lo Cigno,...
78
Voted
CN
2007
137views more  CN 2007»
14 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....