Sciweavers

1807 search results - page 90 / 362
» Resilient Overlay Networks
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
ESAS
2004
Springer
14 years 3 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
CN
2006
100views more  CN 2006»
13 years 10 months ago
Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds
We consider how to construct and maintain a structured overlay P2P network based on the small-world paradigm. Two main attractive properties of a small-world network are (1) a low...
Ken Y. K. Hui, John C. S. Lui, David K. Y. Yau
GCC
2005
Springer
14 years 3 months ago
Exploiting the Heterogeneity in Structured Peer-to-Peer Systems
The structured peer-to-peer system, which is based on the distributed hash table, offers an administration-free and fault-tolerant application-level overlay network. However, a ra...
Tongqing Qiu, Guihai Chen
DSOM
2004
Springer
14 years 3 months ago
Can ISPs and Overlay Networks Form a Synergistic Co-existence?
Ram Keralapura, Nina Taft, Gianluca Iannaccone, Ch...