To get a better understanding of the influence of the media on current political events, researchers in Communication Science have recently reported on several case studies, in w...
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
e network, similar to CPU and memory, is a critical and shared resource in the cloud. However, unlike other resources, it is neither shared proportionally to payment, nor do cl...
Network management applications require accurate estimates of a wide range of flow-level traffic metrics. Given the inadequacy of current packet-sampling-based solutions, several ...