Sciweavers

282 search results - page 36 / 57
» A Framework for the Evaluation and Management of Network Cen...
Sort
View
MIDDLEWARE
2007
Springer
14 years 3 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
MOBIDE
2006
ACM
14 years 3 months ago
Boosting location-based services with a moving object database engine
Composition of temporal and spatial properties of real world objects in a unified data framework results into Moving Object Databases (MOD). MODs are able to process, manage and a...
Nikos Pelekis, Yannis Theodoridis
WWW
2010
ACM
14 years 2 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
CN
2007
90views more  CN 2007»
13 years 9 months ago
Distributed on-demand routing for LEO satellite systems
Notwithstanding the limited commercial success of the first narrowband Low Earth Orbit (LEO) satellite systems, the interest of the scientific community in this type of systems ...
Evangelos Papapetrou, Stylianos Karapantazis, Foti...
INFOCOM
2010
IEEE
13 years 7 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...