Sciweavers

2821 search results - page 55 / 565
» Tracing a single user
Sort
View
SIGCOMM
2006
ACM
14 years 3 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
ICDCSW
2008
IEEE
14 years 3 months ago
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
—In its current art, peer-to-peer streaming solution has been mainly employed in the domain of live event broadcasting. In such a paradigm, users are required to simultaneously p...
Bin Chang, Liang Dai, Yi Cui, Yuan Xue
BIOWIRE
2007
Springer
14 years 3 months ago
User-Centric Mobility Models for Opportunistic Networking
Abstract. In this chapter we survey the most recent proposals for modelling user mobility in mobile pervasive networks, and specifically in opportunistic networks. We identify two...
Chiara Boldrini, Marco Conti, Andrea Passarella
IH
2005
Springer
14 years 2 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
BTW
2003
Springer
76views Database» more  BTW 2003»
14 years 2 months ago
Partitioned B-trees - a user's guide
: A recent article introduced partitioned B-trees, in which partitions are defined not in the catalogs but by distinct values in an artificial leading key column. As there usually ...
Goetz Graefe