Sciweavers

6245 search results - page 1119 / 1249
» A Case for Aggregate Networks
Sort
View
PODC
2003
ACM
15 years 9 months ago
Scalable and dynamic quorum systems
We investigate issues related to the probe complexity of quorum systems and their implementation in a dynamic environment. Our contribution is twofold. The first regards the algo...
Moni Naor, Udi Wieder
130
Voted
SIGMETRICS
2003
ACM
15 years 9 months ago
Resilient multicast using overlays
We introduce PRM (Probabilistic Resilient Multicast): a multicast data recovery scheme that improves data delivery ratios while maintaining low end-to-end latencies. PRM has both ...
Suman Banerjee, Seungjoon Lee, Bobby Bhattacharjee...
WMASH
2003
ACM
15 years 9 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
177
Voted
CBSQ
2003
Springer
15 years 9 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
CCS
2003
ACM
15 years 9 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
« Prev « First page 1119 / 1249 Last » Next »