Sciweavers

92 search results - page 13 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
ICDCS
2011
IEEE
12 years 7 months ago
Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks
—The number of real-world applications that require QoS guarantees is constantly increasing and they often follow the publish/subscribe (pub/sub) messaging paradigm, which provid...
Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei,...
TON
2002
75views more  TON 2002»
13 years 7 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda
INFOCOM
2006
IEEE
14 years 1 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
PVLDB
2008
104views more  PVLDB 2008»
13 years 7 months ago
Scalable multi-query optimization for exploratory queries over federated scientific databases
The diversity and large volumes of data processed in the Natural Sciences today has led to a proliferation of highlyspecialized and autonomous scientific databases with inherent a...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...
ICDCS
2007
IEEE
13 years 11 months ago
Heuristic Approaches to Energy-Efficient Network Design Problem
Energy management remains a critical problem in wireless networks since battery technology cannot keep up with rising communication expectations. Current approaches to energy cons...
Cigdem Sengul, Robin Kravets