Sciweavers

1647 search results - page 42 / 330
» Distributing private data in challenged network environments
Sort
View
124
Voted
CN
2002
87views more  CN 2002»
15 years 3 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
178
Voted
RTAS
2009
IEEE
15 years 10 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
112
Voted
HPDC
1999
IEEE
15 years 8 months ago
A Resource Description Environment for Distributed Computing Systems
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
Matthias Brune, Alexander Reinefeld, Jörg Var...
150
Voted
TKDE
2010
272views more  TKDE 2010»
15 years 1 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
123
Voted
PADS
2005
ACM
15 years 9 months ago
An Adaptive Interest Management Scheme for Distributed Virtual Environments
Abstract— Traditionally Interest Management (IM) in distributed environments has been performed through a ‘top-down’ expression of interest patterns in the model. For many mo...
Rob Minson, Georgios K. Theodoropoulos