Sciweavers

480 search results - page 17 / 96
» Anonymous Transactions in Computer Networks
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
ICNS
2007
IEEE
14 years 3 months ago
Real-time anonymization in passive network monitoring
Abstract—Passive network monitoring that observes user traffic has many advantages over active monitoring that uses test packets. It can provide characteristics of real user tra...
Sven Ubik, Petr Zejdl, Jiri Halak
GEOINFORMATICA
2011
13 years 4 days ago
Query-aware location anonymization for road networks
Chi-Yin Chow, Mohamed F. Mokbel, Jie Bao 0003, Xua...
CORR
2010
Springer
195views Education» more  CORR 2010»
13 years 8 months ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
PET
2007
Springer
14 years 2 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja