Sciweavers

870 search results - page 31 / 174
» The failure detector abstraction
Sort
View
P2P
2009
IEEE
137views Communications» more  P2P 2009»
14 years 3 months ago
Analysis of Failure Correlation Impact on Peer-to-Peer Storage Systems
Abstract—Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing me...
Olivier Dalle, Frédéric Giroire, Jul...
ASIACRYPT
2005
Springer
14 years 2 months ago
A Failure-Friendly Design Principle for Hash Functions
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
Stefan Lucks
EUROCRYPT
2008
Springer
13 years 10 months ago
Protocols and Lower Bounds for Failure Localization in the Internet
Abstract. A secure failure-localization path-quality-monitoring (FLPQM) protocols allows a sender to localize faulty links on a single path through a network to a receiver, even wh...
Boaz Barak, Sharon Goldberg, David Xiao
ISMIS
2005
Springer
14 years 2 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
VTC
2010
IEEE
130views Communications» more  VTC 2010»
13 years 7 months ago
Receiver Multiuser Diversity Aided Multi-Stage MMSE Multiuser Detection for DS-CDMA and SDMA Systems Employing I-Q Modulation
Abstract— The so-called receiver multiuser diversity aided multistage minimum mean-square error multiuser detector (RMD/MS-MMSE MUD), which was proposed previously by the author,...
Lie-Liang Yang