Sciweavers

97 search results - page 15 / 20
» Resiliency of Network Topologies under Path-Based Attacks
Sort
View
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
ICALP
2009
Springer
14 years 10 months ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
ICNP
2007
IEEE
14 years 4 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
GLOBECOM
2007
IEEE
14 years 4 months ago
Position Estimation Error in Edge Detection for Wireless Sensor Networks using Local Convex View
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
Marwan Fayed, Hussein T. Mouftah
CSE
2009
IEEE
14 years 4 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu