Sciweavers

480 search results - page 80 / 96
» Anonymous Transactions in Computer Networks
Sort
View
MOBISYS
2009
ACM
14 years 8 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
CCS
2011
ACM
12 years 7 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...
SASN
2003
ACM
14 years 24 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
SSS
2010
Springer
143views Control Systems» more  SSS 2010»
13 years 6 months ago
Lightweight Live Migration for High Availability Cluster Service
High availability is a critical feature for service clusters and cloud computing, and is often considered more valuable than performance. One commonly used technique to enhance the...
Bo Jiang, Binoy Ravindran, Changsoo Kim

Publication
194views
15 years 6 months ago
Design and Simulation of ATM-ABR End System Congestion Control
We develop a simulation model for the ATM ABR service, and use it to engineer ABR congestion control behavior. Although significant work has been performed on ABR rate allocation a...
Sonia Fahmy, Raj Jain, Rohit Goyal and Bobby Vanda...