Sciweavers

3083 search results - page 544 / 617
» Active Peer to Peer
Sort
View
CONEXT
2008
ACM
13 years 11 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
CSCW
2008
ACM
13 years 11 months ago
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia
Wikipedia has become one of the most important information resources on the Web by promoting peer collaboration and enabling virtually anyone to edit anything. However, this mutab...
Aniket Kittur, Bongwon Suh, Ed H. Chi
CSCW
2008
ACM
13 years 11 months ago
Are you sleeping?: sharing portrayed sleeping status within a social network
Within a group of peers, it is often useful or interesting to know whether someone in the group has gone to bed or whether they have awakened in the morning. This information, nat...
Sunyoung Kim, Julie A. Kientz, Shwetak N. Patel, G...
DSOM
2008
Springer
13 years 11 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
ECOOP
2008
Springer
13 years 11 months ago
Session-Based Distributed Programming in Java
This paper demonstrates the impact of integrating session types and object-oriented programming, through their implementation in Java. Seses provide high-level abstraction for stru...
Raymond Hu, Nobuko Yoshida, Kohei Honda