Sciweavers

443 search results - page 24 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
CN
2007
90views more  CN 2007»
13 years 8 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
CSMR
2007
IEEE
14 years 2 months ago
How Developers Develop Features
Software systems are typically developed by teams of developers, with responsibilities for different parts of the code. Knowledge of how the developers collaborate, and how their ...
Orla Greevy, Tudor Gîrba, Stéphane Du...
TWC
2010
13 years 2 months ago
Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks
Dynamic spectrum leasing (DSL) is one of the schemes proposed for dynamic spectrum sharing (DSS) in cognitive radio networks. In DSL, spectrum owners, denoted as primary users, dyn...
Gonzalo Vazquez-Vilar, Carlos Mosquera, Sudharman ...
NSDI
2007
13 years 10 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
IPTPS
2005
Springer
14 years 1 months ago
Dynamic Load Balancing in Distributed Hash Tables
In Peer-to-Peer networks based on consistent hashing and ring topology each server is responsible for an interval chosen (pseudo-)randomly on a circle. The topology of the network...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...