Sciweavers

648 search results - page 52 / 130
» The GCHQ Protocol and Its Problems
Sort
View
JSA
2008
108views more  JSA 2008»
13 years 8 months ago
A methodology to design arbitrary failure detectors for distributed protocols
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process crash represents only a particular faulty behavior. Handling tougher failures (...
Roberto Baldoni, Jean-Michel Hélary, Sara T...
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 18 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
IPPS
2005
IEEE
14 years 2 months ago
Local Leader Election, Signal Strength Aware Flooding, and Routeless Routing
We have identified a fundamental operator in wireless networks that we named the local leader election in which the goal is to select a node in a spatially close neighborhood. We ...
Gilbert Chen, Joel W. Branch, Boleslaw K. Szymansk...
CLUSTER
2002
IEEE
14 years 1 months ago
Algorithmic Mechanism Design for Load Balancing in Distributed Systems
Computational Grids are large scale computing system composed of geographically distributed resources (computers, storage etc.) owned by self interested agents or organizations. T...
Daniel Grosu, Anthony T. Chronopoulos