Sciweavers

221 search results - page 21 / 45
» A Game-Theoretical Study of Robust Networked Systems
Sort
View
CCS
2008
ACM
13 years 9 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
SASO
2008
IEEE
14 years 1 months ago
Aspects of Distance Sensitive Design of Wireless Sensor Networks
—Distance sensitivity is a locality concept that is useful for designing scalable wireless sensor network applications. In this paper, we formally define distance sensitivity an...
Vinod Kulathumani, Anish Arora
IPPS
2002
IEEE
14 years 9 days ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien
ICIP
2005
IEEE
14 years 9 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 1 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...