Sciweavers

488 search results - page 54 / 98
» Communication Pattern Based Node Selection for Shared Networ...
Sort
View
NCA
2008
IEEE
14 years 3 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
AINA
2007
IEEE
14 years 3 months ago
A Distributed and Dynamic Data Gathering Protocol for Sensor Networks
In this paper we propose a distributed, self organizing, robust and energy efficient data gathering algorithm for sensor networks operating in environments where all the sensor n...
Hüseyin Özgür Tan, Ibrahim Korpeogl...
IMC
2009
ACM
14 years 3 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
ICDCS
2012
IEEE
11 years 11 months ago
DARD: Distributed Adaptive Routing for Datacenter Networks
Datacenter networks typically have many paths connecting each host pair to achieve high bisection bandwidth for arbitrary communication patterns. Fully utilizing the bisection ban...
Xin Wu, Xiaowei Yang
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han