Sciweavers

382 search results - page 56 / 77
» Tracing Network Attacks to Their Sources
Sort
View
VLDB
2002
ACM
135views Database» more  VLDB 2002»
13 years 7 months ago
Maintaining Coherency of Dynamic Data in Cooperating Repositories
In this paper, we consider techniques for disseminating dynamic data--such as stock prices and real-time weather information--from sources to a set of repositories. We focus on th...
Shetal Shah, Krithi Ramamritham, Prashant J. Sheno...
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 9 months ago
Approximate Data Collection in Sensor Networks using Probabilistic Models
Wireless sensor networks are proving to be useful in a variety of settings. A core challenge in these networks is to minimize energy consumption. Prior database research has propo...
David Chu, Amol Deshpande, Joseph M. Hellerstein, ...
WAIM
2010
Springer
13 years 5 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
DISCEX
2003
IEEE
14 years 25 days ago
ANON: An IP-Layer Anonymizing Infrastructure
This exhibition demonstrates an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anon...
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Br...
DISCEX
2003
IEEE
14 years 25 days ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...