Sciweavers

1630 search results - page 6 / 326
» Secure Overlay Network Design
Sort
View
ISARCS
2010
164views Hardware» more  ISARCS 2010»
13 years 10 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
DEXAW
2008
IEEE
93views Database» more  DEXAW 2008»
14 years 3 months ago
Overlay GHC: An Extension of Guarded Horn Clauses for Overlay Programming
Today’s high-speed network allows sophisticated applications of overlay networks. Meanwhile, usage of multicore processors has been spreading. The level of concurrency we need t...
Kenji Saito
CN
2007
137views more  CN 2007»
13 years 8 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
INFOCOM
2005
IEEE
14 years 2 months ago
Topology aware overlay networks
— Recently, overlay networks have emerged as a means to enhance end-to-end application performance and availability. Overlay networks attempt to leverage the inherent redundancy ...
Junghee Han, David Watson, Farnam Jahanian
PDPTA
2004
13 years 10 months ago
ONSP: Parallel Overlay Network Simulation Platform
In research of overlay networks, simulator takes a very important role. However, popular simulators, such as ns and PlanetLab can't meet the scale and performance requirement ...
Yinghui Wu, Ming Li, Weimin Zheng