Sciweavers

1551 search results - page 265 / 311
» Privacy-Preserving Network Aggregation
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 9 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 9 months ago
Analysis of Social Voting Patterns on Digg
The social Web is transforming the way information is created and distributed. Authoring tools, e.g., blog publishing services, enable users to quickly and easily publish content,...
Kristina Lerman, Aram Galstyan
NETWORK
2008
96views more  NETWORK 2008»
13 years 8 months ago
Enabling rapid wireless system composition through layer-2 discovery
Although small mobile computers have processors whose capabilities are increasing, often they still are resource constrained in terms of performing many common computing tasks. Co...
Shivani Sud, Roy Want, Trevor Pering, Barbara Rosa...
IMC
2010
ACM
13 years 6 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...