Sciweavers

2693 search results - page 501 / 539
» French Order Without Order
Sort
View
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 7 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
CN
2008
85views more  CN 2008»
13 years 7 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Expressiveness of Generic Process Shape Types
METAI is a generic process calculus that can be instantiated by supplying rewriting rules defining an operational semantics to make numerous process calculi such as the -calculus,...
Jan Jakubuv, J. B. Wells
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 7 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 7 months ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous