Sciweavers

2057 search results - page 160 / 412
» From content distribution networks to content networks - iss...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
How do Superpeer Networks Emerge?
—In this paper, we develop an analytical framework which explains the emergence of superpeer networks on execution of the commercial peer-to-peer bootstrapping protocols by incom...
Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Ni...
INFOCOM
2010
IEEE
13 years 6 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
WWW
2005
ACM
14 years 9 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
HPDC
1997
IEEE
14 years 16 days ago
Predicting Slowdown for Networked Workstations
Most applications share the resources of networked workstations with other applications. Since system load can vary dramatically, allocation strategies that assume that resources ...
Silvia M. Figueira, Francine Berman
CHI
2006
ACM
14 years 8 months ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...