Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
overlay networks
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
overlay networks
uniform routing table
telecommunication network routing
skip graph
routing algorithm
Routing
Resiliency
query forwarding
pubcrawl
Peer-to-peer computing
Partitioning algorithms
arrays
overlay network
order preserving linear hashing
linear hashing
Limiting
hop reduction
hash algorithms
graph theory
distributed key-value store
Distributed databases
Compositionality
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Resiliency
vpn
Virtual private networks
uncontrolled networks
transport protocols
transport capacity
traffic pattern automatic adjustment
traffic normalization
Traffic analysis
telecommunication traffic
telecommunication network topology
telecommunication congestion control
TCP flows
Scalability
Bandwidth
rate-based congestion control mechanism
pubcrawl
Packet loss
overlay topology
overlay networks
network congestion avoidance
Logic gates
local network testbed
Cryptography
covert-channel-resistant congestion control
covert channels
Compositionality
biblio
"ID Based Web Browser with P2P Property"
Submitted by grigby1 on Tue, 02/21/2017 - 12:14pm
Internet projects
web applications
usage pattern
Uniform resource locators
Streaming media
streaming content services
Servers
pubcrawl170103
Peer-to-peer computing
P2P property
p2p
overlay networks
online front-ends
ISP-friendly P2P content delivery technology
Internet services
browser
Internet content
internet
IDNet
ID based Web browser
ID
host-to-host central model
domain-insulated autonomous network architecture
DIANA
content dissemination model
CDN-P2P-hybrid architecture
CDN
caching function
Browsers
browser-based Web application
biblio
An Accumulated Loss Recovery Algorithm on Overlay Multicast System Using Fountain Codes
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
accumulate loss recovery algorithm
Decoding
delay reduction
delays
encoding
error correction codes
Fountain codes
multicast communication
overlay multicast system
overlay multicast tree
overlay networks
Packet loss
packet loss decoding
packet radio networks
simulation
trees (mathematics)
biblio
Datacenter Applications in Virtualized Networks: A Cross-Layer Performance Study
Submitted by BrandonB on Tue, 05/05/2015 - 10:23am
network virtualization
virtualized networks
Virtualization
virtualisation
software-defined networking
software radio
software defined networking overlays
Servers
Protocols
overlay networks
overlay network
Cloud Computing
IP networks
Hardware
Encapsulation
delays
datacenter workloads
datacenter networks
datacenter applications
cross layer performance study
cross layer hybrid mesoscale simulation platform
computer centres
« first
‹ previous
1
2