Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
A key challenge faced by peer-to-peer(P2P) video-on- demand (VoD) systems is their ability, or lack thereof, to provide DVD-like functionality, such as pause, forward and backward ...
Modern trading and cluster applications require microsecond latencies and almost no losses in data centers. This paper introduces an algorithm called FineComb that can estimate ï¬...
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...