Sciweavers

516 search results - page 52 / 104
» Comparing Two Information Flow Security Properties
Sort
View
PPNA
2011
13 years 3 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
INFOCOM
2009
IEEE
14 years 3 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
SIGCOMM
2012
ACM
11 years 11 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ECIR
2011
Springer
13 years 11 days ago
Towards Quantum-Based DB+IR Processing Based on the Principle of Polyrepresentation
The cognitively motivated principle of polyrepresentation still lacks a theoretical foundation in IR. In this work, we discuss two competing polyrepresentation frameworks that are ...
David Zellhöfer, Ingo Frommholz, Ingo Schmitt...
SPATIALCOGNITION
2004
Springer
14 years 2 months ago
Isovists as a Means to Predict Spatial Experience and Behavior
Two experiments are presented studying interrelations between spatial properties of environments and both experience and spatial behavior. In order to systematically study such int...
Jan Malte Wiener, Gerald Franz