Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Ensuring personal safety for people on the move is becoming a heightened priority in today's uncertain environment. Traditional approaches are no longer adequate in meeting ri...
Abstract-- High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the da...
Chad D. Mano, David Salyers, Qi Liao, Andrew Blaic...