Sciweavers

4061 search results - page 111 / 813
» Routing Using Geospatial Information System Analysis
Sort
View
PET
2005
Springer
15 years 7 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
IESS
2007
Springer
158views Hardware» more  IESS 2007»
15 years 8 months ago
Dynamic Software Update of Resource-Constrained Distributed Embedded Systems
Changing demands, software evolution, and bug fixes require the possibility to update applications as well as system software of embedded devices. Systems that perform updates of ...
Meik Felser, Rüdiger Kapitza, Jürgen Kle...
GIS
2007
ACM
16 years 3 months ago
Where were we: communities for sharing space-time trails
We consider trails to be a document type of growing importance, authored in abundance as locative technologies become embedded in mobile devices carried by billions of humans. As ...
Scott Counts, Marc Smith
ISADS
2003
IEEE
15 years 7 months ago
An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications
In many ubiquitous computing (ubicomp) applications, such as smart classrooms, hospitals, construction sites, stadiums, shopping malls, emergency services, law enforcement, conven...
Stephen S. Yau, Sheikh Iqbal Ahamed
IMC
2005
ACM
15 years 7 months ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste