Sciweavers

850 search results - page 108 / 170
» The structure of information pathways in a social communicat...
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
BIOWIRE
2007
Springer
14 years 2 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
C5
2005
IEEE
14 years 1 months ago
Croquet Learning Environments: Extending the Value of Campus Life into the Online Experience
Croquet is a broadband communications platform with a 3D user interface and peer-to-peer network architecture that provides educators with a new expressive “meta-medium that is ...
Marilyn May Lombardi, Julian Lombardi
SIGMETRICS
2008
ACM
135views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
In search of the elusive ground truth: the internet's as-level connectivity structure
Despite significant efforts to obtain an accurate picture of the Internet's actual connectivity structure at the level of individual autonomous systems (ASes), much has remai...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi