Sciweavers

2316 search results - page 36 / 464
» How Asymmetric Is the Internet
Sort
View
CCS
2007
ACM
14 years 4 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
VLDB
2002
ACM
137views Database» more  VLDB 2002»
13 years 9 months ago
Comparing Data Streams Using Hamming Norms (How to Zero In)
Massive data streams are now fundamental to many data processing applications. For example, Internet routers produce large scale diagnostic data streams. Such streams are rarely s...
Graham Cormode, Mayur Datar, Piotr Indyk, S. Muthu...
OPODIS
2003
13 years 11 months ago
A Peer-to-Peer Approach to Enhance Middleware Connectivity
One of the problems of middleware for shared state is that they are designed, explicitly or implicitly, for symmetric networks. However, since the Internet is not symmetric, end-to...
Erik Klintskog, Valentin Mesaros, Zacharias El Ban...
CCR
2010
132views more  CCR 2010»
13 years 7 months ago
Scafida: a scale-free network inspired data center architecture
Data centers have a crucial role in current Internet architecture supporting content-centric networking. State-of-theart data centers have different architectures like fat-tree [1...
László Gyarmati, Tuan Anh Trinh
NOMS
2002
IEEE
139views Communications» more  NOMS 2002»
14 years 2 months ago
Active connection management in Internet services
We propose a new connection management architecture for clustered Internet services called Active Connection Management (ACM) to improve the availability, quality of service, and ...
Mike Y. Chen, Eric A. Brewer