Sciweavers

3089 search results - page 475 / 618
» services 2008
Sort
View
119
Voted
PVLDB
2008
112views more  PVLDB 2008»
15 years 3 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...
173
Voted
ENTCS
2008
390views more  ENTCS 2008»
15 years 2 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
JNSM
2008
104views more  JNSM 2008»
15 years 2 months ago
Call Forwarding-Based Active Probing for POTS Fault Isolation
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
Chi-Shih Chao, Maitreya Natu, Adarshpal S. Sethi
133
Voted
ITIIS
2010
131views more  ITIIS 2010»
15 years 2 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...
126
Voted
ITIIS
2010
128views more  ITIIS 2010»
15 years 2 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim