A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
For many application-level distributed protocols and parallel algorithms, the set of participants, the number of messages or the interaction structure are only known at run-time. T...
— We address the problem of selecting an appropriate relay station for forwarding data from a source to a destination node in dual-hop communication systems. In this regard, we f...
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
—This paper experimentally analyzes the handover performance of VoIP sessions in a wireless overlay of 802.11 WLANs and GPRS/UMTS networks when mobility is handled at the applica...
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, Mar...