Sciweavers

347 search results - page 21 / 70
» On private computation in incomplete networks
Sort
View
SASN
2006
ACM
14 years 1 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li

Lecture Notes
497views
15 years 5 months ago
ATM Networks: A Series of Tutorials
The lecture notes cover the following topics, Overview, Adaptations Layers, Traffic Management , Issues and Challenges Ahead, Physical Layers (Phy), Multiprotocol over ATM (MPOA)...
Raj Jain
CAISE
2007
Springer
14 years 1 months ago
Personalizing PageRank-Based Ranking over Distributed Collections
In distributed work environments, where users are sharing and searching resources, ensuring an appropriate ranking at remote peers is a key problem. While this issue has been inves...
Stefania Costache, Wolfgang Nejdl, Raluca Paiu
ICDE
2009
IEEE
130views Database» more  ICDE 2009»
14 years 9 months ago
Recursive Computation of Regions and Connectivity in Networks
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
FOCS
2006
IEEE
14 years 1 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...