Sciweavers

146 search results - page 28 / 30
» Secure Routing for Structured Peer-to-Peer Overlay Networks
Sort
View
COOPIS
2004
IEEE
13 years 11 months ago
Performance Evaluation of JXTA Rendezvous
Project JXTA is the first peer-to-peer application development infrastructure, consisting of standard protocols and multi-language implementations. A JXTA peer network is a comple...
Emir Halepovic, Ralph Deters, Bernard Traversat
ICC
2007
IEEE
115views Communications» more  ICC 2007»
13 years 11 months ago
Efficient Estimation of More Detailed Internet IP Maps
Router-level maps of the Internet implicate a large body of research on network management, overlay networks, performance evaluation, and security. The inaccuracies in these maps r...
Sangmin Kim, Khaled Harfoush
SIGCOMM
1997
ACM
13 years 11 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo
EUROSYS
2009
ACM
14 years 4 months ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
CONEXT
2008
ACM
13 years 9 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar