Sciweavers

546 search results - page 92 / 110
» Network Information Flow in Network of Queues
Sort
View
CSREAPSC
2006
13 years 9 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 7 months ago
Influence and Passivity in Social Media
The ever-increasing amount of information flowing through Social Media forces the members of these networks to compete for attention and influence by relying on other people to sp...
Daniel M. Romero, Wojciech Galuba, Sitaram Asur, B...
IPPS
2010
IEEE
13 years 5 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...
SIGMETRICS
2000
ACM
145views Hardware» more  SIGMETRICS 2000»
13 years 7 months ago
The incremental deployability of RTT-based congestion avoidance for high speed TCP Internet connections
Our research focuses on end-to-end congestion avoidance algorithms that use round trip time (RTT) fluctuations as an indicator of the level of network congestion. The algorithms a...
Jim Martin, Arne A. Nilsson, Injong Rhee
CCS
2008
ACM
13 years 9 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis