Sciweavers

2503 search results - page 448 / 501
» Building Computer Network Attacks
Sort
View
ICDCSW
2009
IEEE
14 years 3 months ago
A MANET Based Emergency Communication and Information System for Catastrophic Natural Disasters
When stricken by a catastrophic natural disaster, emergency rescue operation is very critical to many lives. Many people trapped in the disastrous areas under collapsed buildings ...
Yao-Nan Lien, Hung-Chin Jang, Tzu-Chieh Tsai
LOCWEB
2009
ACM
14 years 3 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
ICPADS
2008
IEEE
14 years 3 months ago
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to ...
Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ra...
ICPADS
2008
IEEE
14 years 3 months ago
GROUP: Dual-Overlay State Management for P2P NVE
Peer-to-peer (P2P) architectures have recently become a popular design choice to build scalable Networked Virtual Environments (NVEs). While P2P architectures offer better scalabi...
Eliya Buyukkaya, Maha Abdallah, Romain Cavagna, Sh...
IPPS
2008
IEEE
14 years 3 months ago
Scalable data dissemination using hybrid methods
Web server scalability can be greatly enhanced via hybrid data dissemination methods that use both unicast and multicast. Hybrid data dissemination is particularly promising due t...
Wenhui Zhang, Vincenzo Liberatore, Jonathan Beaver...