Sciweavers

2057 search results - page 366 / 412
» Distributed Secure Systems: Then and Now
Sort
View
SECURWARE
2008
IEEE
14 years 3 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
14 years 3 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
14 years 2 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 2 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
IH
2004
Springer
14 years 2 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...