Sciweavers

251 search results - page 33 / 51
» Transactions with isolation and cooperation
Sort
View
DSN
2005
IEEE
14 years 3 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
13 years 11 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
ICON
2007
IEEE
14 years 4 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
SBBD
2004
137views Database» more  SBBD 2004»
13 years 11 months ago
A Lock Manager for Collaborative Processing of Natively Stored XML Documents
Today, neither transactional provisions, in general, nor concurrency control, in particular, of DBMS-based processing are tailored to the specific needs of large and collaborative...
Michael Peter Haustein, Theo Härder
USS
2004
13 years 11 months ago
Very Fast Containment of Scanning Worms
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
Nicholas Weaver, Stuart Staniford, Vern Paxson