Sciweavers

240 search results - page 12 / 48
» Malicious Users in Unstructured Networks
Sort
View
OTM
2007
Springer
14 years 1 months ago
Bittella: A Novel Content Distribution Overlay Based on Bittorrent and Social Groups
This paper presents Bittella: a new social network for content distribution based on Peer-to-Peer technologies. It exploits the common interests of the users in order to create soc...
Rubén Cuevas Rumín, Carmen Guerrero,...
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 2 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
CDVE
2007
Springer
115views Visualization» more  CDVE 2007»
13 years 11 months ago
A Document Recommendation System Based on Clustering P2P Networks
: This paper presents a document recommendation system based on clustering peer-to-peer networks. It's an unstructured P2P system. In this system each agent-peer can learn use...
Feng Guo, Shaozi Li
NDSS
2000
IEEE
13 years 11 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
CATA
1998
13 years 8 months ago
QVI: Query-based virtual index for distributed information retrieval
The large unstructured text collections demand full-text search capabilities from IR systems. Current systems typically allow users only to connect to a single database (or site) ...
Dong-gyu Kim, Sang-goo Lee