Sciweavers

161 search results - page 9 / 33
» Towards a Theory of Anonymous Networking
Sort
View
IWQOS
2004
Springer
14 years 26 days ago
Network calculus meets queueing theory -a simulation based approach to bounded queues
— Quality of Service (QoS) is an area with high academic curiosity. Our long-term goal is to develop a unified mathematical model. This paper is a first step towards this ambit...
Krishna Pandit, Jens Schmitt, Ralf Steinmetz
ICPP
2007
IEEE
14 years 1 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
SOCIALCOM
2010
13 years 5 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
SIGCOMM
2000
ACM
13 years 12 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang