Sciweavers

1012 search results - page 94 / 203
» Nomadic Service Points
Sort
View
115
Voted
IFIP11
2004
109views Business» more  IFIP11 2004»
15 years 5 months ago
Taxonomy of Mixes and Dummy Traffic
This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues rela...
Claudia Díaz, Bart Preneel
106
Voted
INTERACT
2003
15 years 5 months ago
Programming in the Kitchen
: In this paper we discuss issues for the integration of computing power in mundane artefacts. We do so with reference to a recent project with a manufacturer of ovens for larger k...
Olav W. Bertelsen, Toke Eskildsen, Werner Sperschn...
132
Voted
NETWORK
2007
106views more  NETWORK 2007»
15 years 3 months ago
The Extensive Challenges of Internet Application Measurement
The Internet has grown dramatically and evolved significantly over the past 10 years. While this growth provides new opportunities and many value-added services for millions of I...
Martin F. Arlitt, Carey L. Williamson
252
Voted
AICT
2009
IEEE
226views Communications» more  AICT 2009»
15 years 10 months ago
Optimizing MBMS Power Allocation through HSDPA Transmissions
— Multimedia Broadcast Multicast Service (MBMS) epitomizes the increasing popularity of enhanced end-user experience in Universal Mobile Telecommunications System (UMTS), since i...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
PERCOM
2009
ACM
15 years 10 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner