Sciweavers

575 search results - page 93 / 115
» Robust Distributed Name Service
Sort
View
OTM
2007
Springer
15 years 8 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
PDCAT
2005
Springer
15 years 8 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
IMC
2004
ACM
15 years 8 months ago
Modeling distances in large-scale networks by matrix factorization
In this paper, we propose a model for representing and predicting distances in large-scale networks by matrix factorization. The model is useful for network distance sensitive app...
Yun Mao, Lawrence K. Saul
VRML
2000
ACM
15 years 6 months ago
MVIP - audio enabled multicast VNet
This paper presents a multicast approach to shared virtual worlds. A shared VRML world is described with integrated spatial audio in a freeware VRML browser. An implementation in ...
John L. Robinson, John A. Stewart, Isabelle Labb&e...
DSN
2007
IEEE
15 years 6 months ago
Performability Models for Multi-Server Systems with High-Variance Repair Durations
We consider cluster systems with multiple nodes where each server is prone to run tasks at a degraded level of service due to some software or hardware fault. The cluster serves t...
Hans-Peter Schwefel, Imad Antonios