Sciweavers

304 search results - page 31 / 61
» Measuring the Vulnerability of Interconnection Networks in E...
Sort
View
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
13 years 7 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
COLCOM
2009
IEEE
14 years 12 days ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño
RTAS
2000
IEEE
13 years 11 months ago
Policing Offloaded
Policing of incoming packets can produce very high load in worst-case situations on a receiving computer. In realtime systems, resources must be allocated for such worstcase situa...
Uwe Dannowski, Hermann Härtig
PETRA
2009
ACM
14 years 2 months ago
Identifying people in camera networks using wearable accelerometers
We propose a system to identify people in a sensor network. The system fuses motion information measured from wearable accelerometer nodes with motion traces of each person detect...
Thiago Teixeira, Deokwoo Jung, Gershon Dublon, And...
ISADS
2003
IEEE
14 years 1 months ago
The Central Guardian Approach to Enforce Fault Isolation in the Time-Triggered Architecture
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
Günther Bauer, Hermann Kopetz, Wilfried Stein...