Sciweavers

6919 search results - page 1343 / 1384
» Designing Service Communities
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
LCN
2006
IEEE
14 years 2 months ago
Computing Real Time Jobs in P2P Networks
— In this paper, we present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P envi...
Jingnan Yao, Jian Zhou, Laxmi N. Bhuyan
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 2 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
VTC
2006
IEEE
136views Communications» more  VTC 2006»
14 years 2 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang
IMC
2006
ACM
14 years 2 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
« Prev « First page 1343 / 1384 Last » Next »