Sciweavers

672 search results - page 52 / 135
» Analysis and applications of timed service protocols
Sort
View
SAC
2008
ACM
13 years 8 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
AINA
2010
IEEE
14 years 2 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
P2P
2006
IEEE
135views Communications» more  P2P 2006»
14 years 2 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
SODA
2012
ACM
177views Algorithms» more  SODA 2012»
11 years 11 months ago
Stochastic coalescence in logarithmic time
The following distributed coalescence protocol was introduced by Dahlia Malkhi in 2006 motivated by applications in social networking. Initially there are n agents wishing to coal...
Po-Shen Loh, Eyal Lubetzky
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh