Sciweavers

2715 search results - page 323 / 543
» Network bucket testing
Sort
View
PODC
2012
ACM
12 years 3 days ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
WWW
2008
ACM
14 years 10 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
WWW
2001
ACM
14 years 10 months ago
Map adaptation for users of mobile systems
Display characteristics, network Quality of Service, and the user's current task all exhibit a wide range of variation when users interact with mobile and ubiquitous devices....
Dan Chalmers, Morris Sloman, Naranker Dulay
PERCOM
2006
ACM
14 years 9 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
SC
2009
ACM
14 years 4 months ago
Improving GridFTP performance using the Phoebus session layer
Phoebus is an infrastructure for improving end-to-end throughput in high-bandwidth, long-distance networks by using a “session layer” protocol and “gateways” in the networ...
Ezra Kissel, D. Martin Swany, Aaron Brown