Sciweavers

277 search results - page 29 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
INTERNET
2002
142views more  INTERNET 2002»
13 years 8 months ago
Mapping the Gnutella Network
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Adriana Iamnitchi, Ian T. Foster
BROADNETS
2007
IEEE
14 years 14 days ago
SAABCOT: Secure application-agnostic bandwidth conservation techniques
Abstract-- High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the da...
Chad D. Mano, David Salyers, Qi Liao, Andrew Blaic...
IPTPS
2003
Springer
14 years 1 months ago
Enforcing Fair Sharing of Peer-to-Peer Resources
Cooperative peer-to-peer applications are designed to share the resources of each computer in an overlay network for the common good of everyone. However, users do not necessarily...
Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel
DSOM
2008
Springer
13 years 10 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
ISCC
2006
IEEE
14 years 2 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...