Sciweavers

62 search results - page 10 / 13
» Toward a Taxonomy and Costing Method for Security Services
Sort
View
NORDSEC
2009
Springer
14 years 2 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
INFOCOM
2008
IEEE
14 years 2 months ago
Cross-Monotonic Multicast
—In the routing and cost sharing of multicast towards a group of potential receivers, cross-monotonicity is a property that states a user’s payment can only be smaller when ser...
Zongpeng Li
NCA
2006
IEEE
14 years 1 months ago
Video-on-Demand Equipment Allocation
Video-on-demand (VoD) service providers are intensely interested in transport, storage, streaming and caching in content delivery networks. Today’s 5,000-hour library may grow t...
Frederic Thouin, Mark Coates, Dominic Goodwill
CCR
2007
135views more  CCR 2007»
13 years 7 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 7 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan