Sciweavers

1551 search results - page 189 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
CCS
2008
ACM
14 years 3 days ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
ADHOC
2007
173views more  ADHOC 2007»
13 years 10 months ago
QoS multicast routing by using multiple paths/trees in wireless ad hoc networks
In this paper, we investigate the issues of QoS multicast routing in wireless ad hoc networks. Due to limited bandwidth of a wireless node, a QoS multicast call could often be blo...
Huayi Wu, Xiaohua Jia
CN
2006
99views more  CN 2006»
13 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
SOFTWARE
2002
13 years 9 months ago
Overview of Fuzzy-RED in Diff-Serv Networks
The rapid growth of the Internet and increased demand to use the Internet for time-sensitive voice and video applications necessitate the design and utilization of new Internet arc...
Loukas Rossides, Chrysostomos Chrysostomou, Andrea...