• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21,282
Next 10 →

Network infrastructure

by Key Points
"... There is a risk that network infrastructure market failures relating to electricity grids, carbon dioxide transport systems, passenger and freight transport systems, water delivery systems and urban planning could increase the costs of adjustment to climate change and mitigation. The proposed nation ..."
Abstract - Add to MetaCart
There is a risk that network infrastructure market failures relating to electricity grids, carbon dioxide transport systems, passenger and freight transport systems, water delivery systems and urban planning could increase the costs of adjustment to climate change and mitigation. The proposed

Network Infrastructure

by Kai-hau Yeung, Dereck Fung, Kin-yeung Wong
"... Abstract — Data Link layer is considered as the weakest link in a secured network. If an initial attack comes in at Layer 2, the whole network can be compromised. To illustrate the weakness of Layer 2 networks, attacking tools for this layer are surveyed and discussed in this paper. The main functio ..."
Abstract - Add to MetaCart
Abstract — Data Link layer is considered as the weakest link in a secured network. If an initial attack comes in at Layer 2, the whole network can be compromised. To illustrate the weakness of Layer 2 networks, attacking tools for this layer are surveyed and discussed in this paper. The main

EDUTELLA: A P2P Networking Infrastructure Based on RDF

by Wolfgang Nejdl, Boris Wolf, Changtao Qu, Stefan Decker, Michael Sintek Ambjörn Naeve, Mikael Nilsson, Matthias Palmer, Tore Risch , 2001
"... Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which builds upon metadata standards defined for the WWW and aims to provide an RDFbased metadata infrastructure for P2P applica ..."
Abstract - Cited by 322 (49 self) - Add to MetaCart
Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which builds upon metadata standards defined for the WWW and aims to provide an RDFbased metadata infrastructure for P2P

Globus: A Metacomputing Infrastructure Toolkit

by Ian Foster, Carl Kesselman - International Journal of Supercomputer Applications , 1996
"... Emerging high-performance applications require the ability to exploit diverse, geographically distributed resources. These applications use high-speed networks to integrate supercomputers, large databases, archival storage devices, advanced visualization devices, and/or scientific instruments to for ..."
Abstract - Cited by 1929 (51 self) - Add to MetaCart
to form networked virtual supercomputers or metacomputers. While the physical infrastructure to build such systems is becoming widespread, the heterogeneous and dynamic nature of the metacomputing environment poses new challenges for developers of system software, parallel tools, and applications

Attacks on network infrastructure

by Danai Chasaki, Qiang Wu, Tilman Wolf - In Proc. of Twentieth IEEE International Conference on Computer Communications and Networks (ICCCN) (Maui , 2011
"... Abstract—We present the first practical example of an entirely new class of network attacks – attacks that target the network in-frastructure. Modern routers in computer networks use general-purpose programmable packet processors. The software used for packet processing on these systems is potential ..."
Abstract - Cited by 8 (5 self) - Add to MetaCart
Abstract—We present the first practical example of an entirely new class of network attacks – attacks that target the network in-frastructure. Modern routers in computer networks use general-purpose programmable packet processors. The software used for packet processing on these systems

of Critical Network Infrastructures?

by David L. Alderson, John C. Doyle
"... Abstract — Considerable attention is now being devoted to the study of “complexity science ” with the intent of discovering and applying universal laws of highly interconnected and evolved systems. This paper considers several issues related to the use of these theories in the context of critical in ..."
Abstract - Add to MetaCart
infrastructures, particularly the Internet. Specifically, we revisit the notion of “organized complexity ” and suggest that it is fundamental to our ability to understand, operate, and design next-generation infrastructure networks. We comment on the role of engineering in defining an architecture to support

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

Telex: Anticensorship in the Network Infrastructure

by Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
"... In this paper, we present Telex, a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors ’ unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblock ..."
Abstract - Cited by 30 (4 self) - Add to MetaCart
, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors’ networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special “tag ” and transparently

Tapestry: An infrastructure for fault-tolerant wide-area location and routing

by Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph , 2001
"... In today’s chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores an alternative ..."
Abstract - Cited by 1250 (31 self) - Add to MetaCart
In today’s chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

by Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Antony Rowstron - IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (JSAC , 2002
"... This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, ..."
Abstract - Cited by 658 (29 self) - Add to MetaCart
This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet
Next 10 →
Results 1 - 10 of 21,282
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University