Sciweavers

648 search results - page 73 / 130
» Authenticated hash tables
Sort
View
SIGCOMM
2004
ACM
14 years 1 months ago
A layered naming architecture for the internet
Currently the Internet has only one level of name resolution, DNS, which converts user-level domain names into IP addresses. In this paper we borrow liberally from the literature ...
Hari Balakrishnan, Karthik Lakshminarayanan, Sylvi...
SIGCOMM
2004
ACM
14 years 1 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin
AIMS
2009
Springer
14 years 10 days ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
IMC
2007
ACM
13 years 9 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
PAMI
2002
187views more  PAMI 2002»
13 years 7 months ago
Human Activity Recognition Using Multidimensional Indexing
In this paper, we develop a novel method for view-based recognition of human action/activity from videos. By observing just a few frames, we can identify the activity that takes pl...
Jezekiel Ben-Arie, Zhiqian Wang, Purvin Pandit, Sh...