Sciweavers

19 search results - page 2 / 4
» Using Traffic Analysis to Identify Tor Usage - A Proposed St...
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Robustness Guarantees for Anonymity
—Anonymous communication protocols must achieve two seemingly contradictory goals: privacy (informally, they must guarantee the anonymity of the parties that send/receive informa...
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tama...
LCN
2005
IEEE
14 years 28 days ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
IWPSE
2007
IEEE
14 years 1 months ago
Using concept analysis to detect co-change patterns
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Tudor Gîrba, Stéphane Ducasse, Adrian...
JCM
2007
123views more  JCM 2007»
13 years 7 months ago
Experimental Analysis of VoIP over Wireless Local Area Networks
—VoIP is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet. VoIP became a viable alternative to the public switched ...
Abderrahmane Lakas, Mohammed Boulmalf
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
14 years 8 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...