Sciweavers

1014 search results - page 131 / 203
» Distributed Algorithms for Attack Localization in All-Optica...
Sort
View
ALGOSENSORS
2004
Springer
14 years 2 months ago
Constrained Flow Optimization with Applications to Data Gathering in Sensor Networks
We focus on data gathering problems in energy-constrained wireless sensor networks. We study store-and-gather problems where data are locally stored on the sensors before the data ...
Bo Hong, Viktor K. Prasanna
IPPS
1999
IEEE
14 years 1 months ago
Qos Control and Adaptation in Distributed Multimedia Systems
Presently, many distributed multimedia systems adapt to their changing environments and Quality of Service (QoS) requirements by exchanging control and feedback data between server...
Farid Naït-Abdesselam, Nazim Agoulmine
AP2PS
2009
IEEE
14 years 2 months ago
A Highly Robust P2P-CDN under Large-Scale and Dynamic Participation
—By building a P2P Content Distribution Network (CDN), peers collaborate to distribute the content of underprovisionned websites and to serve queries for larger audiences on beha...
Manal El Dick, Esther Pacitti, Bettina Kemme
CCS
2006
ACM
14 years 24 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 9 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin