Sciweavers

8740 search results - page 94 / 1748
» The Management of Replicated Data
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 10 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
BMCBI
2006
155views more  BMCBI 2006»
15 years 4 months ago
A powerful method for detecting differentially expressed genes from GeneChip arrays that does not require replicates
Background: Studies of differential expression that use Affymetrix GeneChip arrays are often carried out with a limited number of replicates. Reasons for this include financial co...
Anne-Mette K. Hein, Sylvia Richardson
USENIX
1990
15 years 5 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
SRDS
2010
IEEE
15 years 2 months ago
P-Store: Genuine Partial Replication in Wide Area Networks
Partial replication is a way to increase the scalability of replicated systems since updates only need to be applied to a subset of the system's sites, thus allowing replicas...
Nicolas Schiper, Pierre Sutra, Fernando Pedone
IPPS
2006
IEEE
15 years 10 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...