Sciweavers

3972 search results - page 695 / 795
» Design of the iSCSI Protocol
Sort
View
136
Voted
DSN
2007
IEEE
15 years 9 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
ICDCS
2010
IEEE
15 years 9 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
147
Voted
PODC
2010
ACM
15 years 8 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
144
Voted
SUTC
2010
IEEE
15 years 8 months ago
Generic Information Transport for Wireless Sensor Networks
—A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse appli...
Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Aya...
164
Voted
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 8 months ago
Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming Over Wireless Ad-Hoc Networks
Abstract-- Simultaneous support of multiple delay-critical application sessions such as multiuser video streaming require a paradigm shift in the design of ad-hoc wireless networks...
Sachin Adlakha, Xiaoqing Zhu, Bernd Girod, Andrea ...