Sciweavers

334 search results - page 56 / 67
» Inapproximability of Survivable Networks
Sort
View
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
14 years 3 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
AINA
2007
IEEE
14 years 2 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 2 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
ICDCS
2007
IEEE
14 years 2 months ago
Differentiated Data Persistence with Priority Random Linear Codes
Both peer-to-peer and sensor networks have the fundamental characteristics of node churn and failures. Peers in P2P networks are highly dynamic, whereas sensors are not dependable...
Yunfeng Lin, Baochun Li, Ben Liang
ICAC
2006
IEEE
14 years 2 months ago
Collaborative Self-Organization by Devices Providing Document Services - A Multi-Agent Perspective
— In a service oriented environment such as the realm of document services, the conventional notion is that of a multi-function device interacting individually with customer appl...
Nathan Gnanasambandam, Naveen Sharma, Soundar R. T...