Sciweavers

480 search results - page 57 / 96
» Anonymous Transactions in Computer Networks
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
Developing Parallel Applications Using the JAVAPORTS Environment
The JavaPorts system is an environment that facilitates the rapid development of modular, reusable, Java-based parallel and distributed applications for networked machines with het...
Demetris G. Galatopoullos, Elias S. Manolakos
P2P
2008
IEEE
14 years 3 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
PDP
2005
IEEE
14 years 2 months ago
FOBr: A Version-Based Recovery Protocol For Replicated Databases
Within the field of databases that are deployed in distributed environments there is a need to guarantee consistency among replicas and availability among nodes despite of networ...
Francisco Castro-Company, Luis Irún-Briz, F...
CCS
2010
ACM
13 years 9 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
FTDCS
2004
IEEE
14 years 15 days ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow