Sciweavers

2139 search results - page 317 / 428
» Distributed computing and computer security education
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
CCGRID
2005
IEEE
14 years 2 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman
ICDCSW
2005
IEEE
14 years 2 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody
ICDCSW
2003
IEEE
14 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
IWAN
1999
Springer
14 years 1 months ago
ANMAC: An Architectural Framework for Network Management and Control using Active Networks
In this paper, we propose a new framework called Active Network Management and Control (ANMAC) for the management and control of high speed networks. The software architecture in A...
Samphel Norden, Kenneth F. Wong