Results 1 - 10
of
21,282
Network infrastructure
"... There is a risk that network infrastructure market failures relating to electricity grids, carbon dioxide transport systems, passenger and freight transport systems, water delivery systems and urban planning could increase the costs of adjustment to climate change and mitigation. The proposed nation ..."
Abstract
- Add to MetaCart
There is a risk that network infrastructure market failures relating to electricity grids, carbon dioxide transport systems, passenger and freight transport systems, water delivery systems and urban planning could increase the costs of adjustment to climate change and mitigation. The proposed
Network Infrastructure
"... Abstract — Data Link layer is considered as the weakest link in a secured network. If an initial attack comes in at Layer 2, the whole network can be compromised. To illustrate the weakness of Layer 2 networks, attacking tools for this layer are surveyed and discussed in this paper. The main functio ..."
Abstract
- Add to MetaCart
Abstract — Data Link layer is considered as the weakest link in a secured network. If an initial attack comes in at Layer 2, the whole network can be compromised. To illustrate the weakness of Layer 2 networks, attacking tools for this layer are surveyed and discussed in this paper. The main
EDUTELLA: A P2P Networking Infrastructure Based on RDF
, 2001
"... Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which builds upon metadata standards defined for the WWW and aims to provide an RDFbased metadata infrastructure for P2P applica ..."
Abstract
-
Cited by 322 (49 self)
- Add to MetaCart
Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which builds upon metadata standards defined for the WWW and aims to provide an RDFbased metadata infrastructure for P2P
Globus: A Metacomputing Infrastructure Toolkit
- International Journal of Supercomputer Applications
, 1996
"... Emerging high-performance applications require the ability to exploit diverse, geographically distributed resources. These applications use high-speed networks to integrate supercomputers, large databases, archival storage devices, advanced visualization devices, and/or scientific instruments to for ..."
Abstract
-
Cited by 1929 (51 self)
- Add to MetaCart
to form networked virtual supercomputers or metacomputers. While the physical infrastructure to build such systems is becoming widespread, the heterogeneous and dynamic nature of the metacomputing environment poses new challenges for developers of system software, parallel tools, and applications
Attacks on network infrastructure
- In Proc. of Twentieth IEEE International Conference on Computer Communications and Networks (ICCCN) (Maui
, 2011
"... Abstract—We present the first practical example of an entirely new class of network attacks – attacks that target the network in-frastructure. Modern routers in computer networks use general-purpose programmable packet processors. The software used for packet processing on these systems is potential ..."
Abstract
-
Cited by 8 (5 self)
- Add to MetaCart
Abstract—We present the first practical example of an entirely new class of network attacks – attacks that target the network in-frastructure. Modern routers in computer networks use general-purpose programmable packet processors. The software used for packet processing on these systems
of Critical Network Infrastructures?
"... Abstract — Considerable attention is now being devoted to the study of “complexity science ” with the intent of discovering and applying universal laws of highly interconnected and evolved systems. This paper considers several issues related to the use of these theories in the context of critical in ..."
Abstract
- Add to MetaCart
infrastructures, particularly the Internet. Specifically, we revisit the notion of “organized complexity ” and suggest that it is fundamental to our ability to understand, operate, and design next-generation infrastructure networks. We comment on the role of engineering in defining an architecture to support
A Secure Routing Protocol for Ad Hoc Networks
, 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract
-
Cited by 508 (0 self)
- Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.
Telex: Anticensorship in the Network Infrastructure
"... In this paper, we present Telex, a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors ’ unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblock ..."
Abstract
-
Cited by 30 (4 self)
- Add to MetaCart
, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors’ networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special “tag ” and transparently
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
, 2001
"... In today’s chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores an alternative ..."
Abstract
-
Cited by 1250 (31 self)
- Add to MetaCart
In today’s chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores
SCRIBE: A large-scale and decentralized application-level multicast infrastructure
- IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (JSAC
, 2002
"... This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, ..."
Abstract
-
Cited by 658 (29 self)
- Add to MetaCart
This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet
Results 1 - 10
of
21,282