Network patterns are based on generic algorithms that execute on tree-based overlays. A set of such patterns has been developed at KTH to support distributed monitoring in network...
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
Grid computing technologies are increasingly being used to aggregate computing resources that are geographically distributed. Commercial networks are being used to connect these r...
Anthony Sulistio, Gokul Poduval, Rajkumar Buyya, C...
Parallel computing on clusters of workstations is attractive because of the low costs in comparison to MPPs, but the speed of the local area network limits the class of applicatio...
Koen Langendoen, Rutger F. H. Hofman, Henri E. Bal
Effective and efficient power management remains one of the most formidable obstacles that must be overcome before Wireless Sensor Networks can be deployed on a widespread basis. E...