Sciweavers

3641 search results - page 670 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
ECUMN
2007
Springer
14 years 2 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
14 years 1 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
DSOM
2005
Springer
14 years 1 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
DSN
2003
IEEE
14 years 1 months ago
TCP Server Fault Tolerance Using Connection Migration to a Backup Server
This paper describes the design, implementation, and performance evaluation of ST-TCP (Server fault-Tolerant TCP), which is an extension of TCP to tolerate TCP server failures. Th...
Manish Marwah, Shivakant Mishra, Christof Fetzer