Sciweavers

4998 search results - page 785 / 1000
» The case for intentional networking
Sort
View
CCS
2008
ACM
13 years 11 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
BVAI
2007
Springer
13 years 11 months ago
Logic as Energy: A SAT-Based Approach
This paper presents the implementation of ARQ-PROP II, a limited-depth propositional reasoner, via the compilation of its specification into an exact formulation using the satyrus...
Priscila Machado Vieira Lima, M. Mariela Morveli-E...
COCOON
2008
Springer
13 years 11 months ago
Spreading Messages
Abstract. We model a network in which messages spread by a simple directed graph G = (V, E) [1] and a function : V N mapping each v V to a positive integer less than or equal to...
Ching-Lueh Chang, Yuh-Dauh Lyuu
CONEXT
2008
ACM
13 years 11 months ago
Providing UMTS connectivity to PlanetLab nodes
Planetlab is widely recognized as being one of the most important Internet-scale testbeds. However, while allowing experimentations involving hundreds of hosts spread all over the...
Alessio Botta, Roberto Canonico, Giovanni Di Stasi...
DCOSS
2008
Springer
13 years 11 months ago
An Information Theoretic Framework for Field Monitoring Using Autonomously Mobile Sensors
We consider a mobile sensor network monitoring a spatio-temporal field. Given limited caches at the sensor nodes, the goal is to develop a distributed cache management algorithm to...
Hany Morcos, George Atia, Azer Bestavros, Ibrahim ...