Sciweavers

14704 search results - page 2673 / 2941
» computing 2007
Sort
View
IMC
2007
ACM
15 years 6 months ago
Towards network triangle inequality violation aware distributed systems
Many distributed systems rely on neighbor selection mechanisms to create overlay structures that have good network performance. These neighbor selection mechanisms often assume th...
Guohui Wang, Bo Zhang, T. S. Eugene Ng
IMC
2007
ACM
15 years 6 months ago
Usage-based dhcp lease time optimization
The Dynamic Host Configuration Protocol (DHCP) is used to dynamically allocate address space to hosts on a local area network. Despite its widespread usage, few studies exist on ...
Manas Khadilkar, Nick Feamster, Matt Sanders, Russ...
IMC
2007
ACM
15 years 6 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
INFOSCALE
2007
ACM
15 years 6 months ago
An agent-based decentralised process management framework for web service composition
Web service composition provision which requires efficient coordination of the execution of component services is a critical issue in service-oriented computing. Nowadays, BPEL4WS...
Jun Yan, Phillip Pidgeon, Aneesh Krishna, Jianming...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 6 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
« Prev « First page 2673 / 2941 Last » Next »