Sciweavers

151 search results - page 12 / 31
» On investigating overlay service topologies
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 11 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
WSC
2004
13 years 9 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
DSOM
2006
Springer
13 years 11 months ago
Reconfiguring Self-stabilizing Publish/Subscribe Systems
Recent work on self-stabilizing routing in publish/subscribe systems showed that it is feasible to automate reconfigurations in case of faults by enabling the system to recover fro...
Michael A. Jaeger, Gero Mühl, Matthias Werner...
ICC
2009
IEEE
111views Communications» more  ICC 2009»
14 years 2 months ago
Supporting VCR-Like Operations in Derivative Tree-Based P2P Streaming Systems
— Supporting user interactivity in peer-to-peer streaming systems is challenging. VCR-like operations, such as random seek, pause, fast forward and rewind, require timely P2P ove...
Tianyin Xu, Jianzhong Chen, Wenzhong Li, Sanglu Lu...
DSOM
2008
Springer
13 years 9 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos