Sciweavers

209 search results - page 25 / 42
» Time Scaling of Chaotic Systems: Application to Secure Commu...
Sort
View
SPAA
2010
ACM
14 years 15 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
SIGMOD
2008
ACM
116views Database» more  SIGMOD 2008»
14 years 7 months ago
SPADE: the system s declarative stream processing engine
In this paper, we present Spade - the System S declarative stream processing engine. System S is a large-scale, distributed data stream processing middleware under development at ...
Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Philip...
GRID
2007
Springer
13 years 7 months ago
Data Management in the APPA System
Combining Grid and P2P technologies can be exploited to provide high-level data sharing in large-scale distributed environments. However, this combination must deal with two hard p...
Reza Akbarinia, Vidal Martins
GLOBECOM
2008
IEEE
14 years 2 months ago
An Empirical Study of Flash Crowd Dynamics in a P2P-Based Live Video Streaming System
—Peer-to-Peer (P2P) based live video streaming system has emerged as a promising solution for the Internet video streaming applications, partly evident from commercial deployment...
Bo Li, Gabriel Yik Keung, Susu Xie, Fangming Liu, ...
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...