Sciweavers

1647 search results - page 231 / 330
» Distributing private data in challenged network environments
Sort
View
169
Voted
IJISEC
2006
119views more  IJISEC 2006»
15 years 4 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
IEEEARES
2006
IEEE
15 years 10 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
118
Voted
DEBS
2003
ACM
15 years 9 months ago
Looking into the past: enhancing mobile publish/subscribe middleware
Publish/subscribe (pub/sub) middleware facilitates loosely coupled cooperation and fits well the needs of spontaneous, ad-hoc interaction. However, newly started mobile applicati...
Mariano Cilia, Ludger Fiege, C. Haul, Andreas Zeid...
137
Voted
JNW
2006
145views more  JNW 2006»
15 years 4 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
SASN
2006
ACM
15 years 10 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy