Sciweavers

1845 search results - page 270 / 369
» Computing the Angularity Tolerance
Sort
View
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
HPCC
2007
Springer
14 years 4 months ago
A Fast Disaster Recovery Mechanism for Volume Replication Systems
Disaster recovery solutions have gained popularity in the past few years because of their ability to tolerate disasters and to achieve the reliability and availability. Data replic...
Yanlong Wang, Zhanhuai Li, Wei Lin
NETCOOP
2007
Springer
14 years 4 months ago
Pricing for QoS Provisioning Across Multiple Internet Service Provider Domains
In this paper we introduce a pricing scheme to be employed between a group of Internet service providers (ISPs) and a customer who wishes to initiate a packet flow from a fixed o...
Soheil Saberi, Roland P. Malhamé, Lorne Mas...
CCECE
2006
IEEE
14 years 4 months ago
Packet CDMA Communication without Preambles
This paper applies a segmented matched filter for acquiring chip codephase alignment in direct-sequence CDMA packet communications. This alignment is essential for decoding the sp...
Md. Sajjad Rahaman, David E. Dodds
CCGRID
2006
IEEE
14 years 4 months ago
ReCon: A Fast and Reliable Replica Retrieval Service for the Data Grid
The Data Grid provides a scalable infrastructure for storage resources and data distribution management. It also supports a variety of scientific applications that require access...
XiaoLi Zhou, Eunsung Kim, Jai Wug Kim, Heon Young ...