Sciweavers

675 search results - page 127 / 135
» Anonymous communication in overlay networks
Sort
View
OPODIS
2004
14 years 8 days ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 5 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...
ICPP
2008
IEEE
14 years 5 months ago
Fast Source Switching for Gossip-Based Peer-to-Peer Streaming
In this paper we consider gossip-based Peer-to-Peer streaming applications where multiple sources exist and they work serially. More specifically, we tackle the problem of fast s...
Zhenhua Li, Jiannong Cao, Guihai Chen, Yan Liu
IROS
2007
IEEE
97views Robotics» more  IROS 2007»
14 years 5 months ago
Meld: A declarative approach to programming ensembles
Abstract— This paper presents Meld, a programming language for modular robots, i.e., for independently executing robots where inter-robot communication is limited to immediate ne...
Michael P. Ashley-Rollman, Seth Copen Goldstein, P...
SIGCOMM
2004
ACM
14 years 4 months ago
Mercury: supporting scalable multi-attribute range queries
This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute rangebased searches. Mercury differs from previous range-based query systems in that...
Ashwin R. Bharambe, Mukesh Agrawal, Srinivasan Ses...