Sciweavers

480 search results - page 28 / 96
» Anonymous Transactions in Computer Networks
Sort
View

Publication
173views
15 years 7 months ago
A Comparison of Hashing Schemes for Address Lookup in Computer Networks
Using a trace of address references, we compared the efficiency of several different hashing functions, such as cyclic redundancy checking (CRC) polynomials, Fletcher checksum, fol...
R. Jain
CCGRID
2004
IEEE
14 years 13 days ago
HTTP(P2P): a transaction based (HTTP) peer-to-peer protocol for the dissemination of Web-objects in congested networks
Highly popular websites can suffer classical congestion collapse because of the ability of outgoing `bursty' data to congest the server side link. Using the well known and re...
R. L. R. Mattson, S. Ghosh
MASCOTS
2000
13 years 10 months ago
A Transaction-Level Tool for Predicting TCP Performance and for Network Engineering
Most network engineering tools are unsatisfactory. Measurements are not predictive, simulations do not scale, and analysis is limited to oversimplified models. To be more useful, ...
Jean C. Walrand
MDM
2007
Springer
124views Communications» more  MDM 2007»
14 years 2 months ago
Isolating Transactions on Replicated Content Going Mobile
Mobile databases are a centerpiece of the dramatic growth of data-centric applications for mobile computing, nomadic communication and wireless networks. Replication of database c...
José Enrique Armendáriz-Iñigo...
NSDI
2007
13 years 11 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi