Sciweavers

137 search results - page 21 / 28
» A Metric for DISH Networks: Analysis, Implications, and Appl...
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
14 years 2 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
WWW
2011
ACM
13 years 2 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi
SPAA
2003
ACM
14 years 24 days ago
Throughput-centric routing algorithm design
The increasing application space of interconnection networks now encompasses several applications, such as packet routing and I/O interconnect, where the throughput of a routing a...
Brian Towles, William J. Dally, Stephen P. Boyd
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 7 months ago
Fundamental Limits of Wideband Localization - Part I: A General Framework
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...
Yuan Shen, Moe Z. Win