Sciweavers

828 search results - page 119 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 2 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
107
Voted
SAC
2006
ACM
15 years 8 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
213
Voted
ICDE
2009
IEEE
121views Database» more  ICDE 2009»
16 years 4 months ago
Holistic Query Transformations for Dynamic Web Applications
A promising approach to scaling Web applications is to distribute the server infrastructure on which they run. This approach, unfortunately, can introduce latency between the appl...
Amit Manjhi, Charles Garrod, Bruce M. Maggs, Todd ...
IPPS
2005
IEEE
15 years 8 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
121
Voted
ICNP
2007
IEEE
15 years 9 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...