With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...