This paper presents a scalable and adaptive decentralized metadata lookup scheme for ultra large-scale file systems (≥ Petabytes or even Exabytes). Our scheme logically organiz...
Yu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
This research is motivated by the needs of robust streaming of vector graphics contents over the Internet, wireless and other lossy networks. We present a multiple description cod...
This video demonstrates a highly integrated system for automatically registering, guiding and assisting delegates of a conference. The delegate uses an iPAQ to communicate with a ...
Paul Simons, Yacine Ghamri-Doudane, Sidi-Mohammed ...
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...