Sciweavers

2057 search results - page 269 / 412
» Distributed Secure Systems: Then and Now
Sort
View
TON
2012
13 years 6 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
DSN
2009
IEEE
15 years 1 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
TDSC
2010
160views more  TDSC 2010»
14 years 10 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
140
Voted
SASN
2006
ACM
15 years 10 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
MEDINFO
2007
193views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Another HISA - The New Standard: Health Informatics - Service Architecture
In addition to the meaning as Health Informatics Society of Australia, HISA is the acronym used for the new European Standard: Health Informatics – Service Architecture. This EN...
Gunnar O. Klein, Pier Angelo Sottile, Frederik End...