Sciweavers

283 search results - page 44 / 57
» Incentive Networks
Sort
View
CCS
2004
ACM
14 years 1 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
GLOBECOM
2010
IEEE
13 years 5 months ago
Unveiling Popularity of BitTorrent Darknets
BitTorrent is today's most influential peer-to-peer system. Currently BitTorrent has two very different operating models: (1) public trackers, and (2) private trackers (also k...
Xiaowei Chen, Xiaowen Chu, Jiangchuan Liu
MINENET
2006
ACM
14 years 1 months ago
Mining web logs to debug distant connectivity problems
Content providers base their business on their ability to receive and answer requests from clients distributed across the Internet. Since disruptions in the flow of these request...
Emre Kiciman, David A. Maltz, Moisés Goldsz...
NETWORKING
2010
13 years 9 months ago
Toward Efficient On-Demand Streaming with BitTorrent
This paper considers the problem of adapting the BitTorrent protocol for on-demand streaming. BitTorrent is a popular peer-to-peer file sharing protocol that efficiently accommodat...
Youmna Borghol, Sebastien Ardon, Niklas Carlsson, ...
CN
2007
103views more  CN 2007»
13 years 7 months ago
A game theoretic comparison of TCP and digital fountain based protocols
In this paper we analyze a novel paradigm of reliable communication which is not based on the traditional timeout-andretransmit mechanism of TCP. Our approach, which we call Fount...
Luis López, Antonio Fernández, Vicen...