Sciweavers

450 search results - page 68 / 90
» Reliable Communication over Partially Authenticated Networks
Sort
View
SBP
2010
Springer
14 years 1 months ago
Social Network Data and Practices: The Case of Friendfeed
Due to their large worldwide adoption, Social Network Sites (SNSs) have been widely used in many global events as an important source to spread news and information. While the sear...
Fabio Celli, F. Marta L. Di Lascio, Matteo Magnani...
JNW
2007
128views more  JNW 2007»
13 years 7 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
INFOCOM
2010
IEEE
13 years 6 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
DSN
2002
IEEE
14 years 25 days ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
SIGCOMM
2006
ACM
14 years 1 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster