Information Technology Reference
In-Depth Information
[BOINC, 2009] BOINC (2009). http://boinc.berkeley.edu .
[Bonald et al., 2008] Bonald, T., Massoulie, L., Mathieu, F., Perino, D., and
Twigg, A. (2008). Epidemic Live Streaming: Optimal Performance Trade-
Offs. In Proceedings of ACM SIGMETRICS 2008, pages 325-336.
[Brinkmeier et al., 2009] Brinkmeier, M., Schafer, G., and Strufe, T. (2009).
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming.
IEEE Transactions on Parallel and Distributed Systems, (6):831-844.
[Buchegger and Boudec, 2005] Buchegger, S. and Boudec, J.-Y. L. (2005).
Self-Policing Mobile Ad Hoc Networks by Reputation Systems. IEEE Com-
munications Magazine, pages 101-107.
[Butler et al., 2000] Butler, R., Welch, V., Engert, D., Foster, I., Tuecke, S.,
Volmer, J., and Kesselman, C. (2000). A National-Scale Authentication
Infrastructure. IEEE Computer, (12):60-66.
[Caizzone et al., 2008] Caizzone, G., Corghi, A., Giacomazzi, P., and Nonnoi,
M. (2008).
Analysis of the Scalability of the Overlay Skype System.
In
Proceedings of ICC 2008.
[Castro et al., 2003a] Castro, M., Druschel, P., Kermarrec, A., Nandi, A.,
Rowstron, A., and Singh, A. (2003a). Splitstream: High-Bandwidth Multi-
cast in Cooperative Environments. In Proceedings of the 19th ACM Sym-
posium on Operating Systems Principles.
[Castro et al., 2003b] Castro, M., Druschel, P., Kermarrec, A.-M., Nandi, A.,
Rowstron, A., and Singh, A. (2003b). SplitStream: High-Bandwidth Mul-
ticast in Cooperative Environments. In Proceedings of SOSP 2003, pages
298-313.
[Chan et al., 2005a] Chan, H., Gligor, V. D., Perrig, A., and Muralidharan,
G. (2005a). On the Distribution and Revocation of Cryptographic Keys in
Sensor Networks. IEEE Transactions on Dependable and Secure Computing,
2(3):233-247.
[Chan and Perrig, 2005] Chan, H. and Perrig, A. (2005). PIKE: Peer Inter-
mediaries for Key Establishment in Sensor Networks. In INFOCOM 2005,
volume 1, pages 524-535.
[Chan et al., 2003] Chan, H., Perrig, A., and Song, D. (2003). Random Key
Predistribution Schemes for Sensor Networks. In IEEE Symposium on Se-
curity and Privacy, pages 197-213.
[Chan et al., 2005b] Chan, S.-P., Poovendran, R., and Sun, M.-T. (2005b).
A Key Management Scheme in Distributed Sensor Networks Using Attack
Probabilities. In GLOBECOM 2005, volume 2, pages 1007-1011.
Search WWH ::




Custom Search