Sciweavers

2316 search results - page 34 / 464
» How Asymmetric Is the Internet
Sort
View
CCR
2005
82views more  CCR 2005»
13 years 9 months ago
Measuring the evolution of transport protocols in the internet
In this paper we explore the evolution of both the Internet's most heavily used transport protocol, TCP, and the current network environment with respect to how the network&#...
Alberto Medina, Mark Allman, Sally Floyd
PAMI
2007
157views more  PAMI 2007»
13 years 9 months ago
The Asymmetry of Image Registration and Its Application to Face Tracking
Most image registration problems are formulated in an asymmetric fashion. Given a pair of images, one is implicitly or explicitly regarded as a template, and warped onto the other...
Göksel Dedeoglu, Takeo Kanade, Simon Baker
P2P
2009
IEEE
14 years 4 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
MSWIM
2005
ACM
14 years 3 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
SP
2003
IEEE
14 years 3 months ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song