Sciweavers

1977 search results - page 387 / 396
» internet 2008
Sort
View
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
NCA
2008
IEEE
15 years 4 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
15 years 4 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 4 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
P2P
2008
IEEE
15 years 4 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...