Sciweavers

278 search results - page 29 / 56
» Variants of Spreading Messages
Sort
View
AI
2005
Springer
14 years 1 months ago
Privacy Compliance Enforcement in Email
Privacy is one of the main societal concerns raised by critics of the uncontrolled growth and spread of information technology in developed societies. The purpose of this paper is ...
Quintin Armour, William Elazmeh, Nour El-Kadri, Na...
ICNP
2000
IEEE
14 years 21 hour ago
Analysis of Internet Multicast Traffic Performance Considering Multicast Routing Protocol
Recently, audio and video delivery services are widely spread in the Internet. In order to deliver these data to multiple receivers at the same time, the multicast technologies ar...
Seiji Ueno, Toshihiko Kato, Kenji Suzuki
ADHOC
2008
95views more  ADHOC 2008»
13 years 7 months ago
The polarized gossip protocol for path discovery in MANETs
In this paper we present a novel probabilistic protocol for path discovery in Mobile Ad Hoc Networks (MANETs). The protocol implements what we call a polarized gossiping algorithm...
Roberto Beraldi
WWW
2011
ACM
13 years 2 months ago
Information credibility on twitter
We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter...
Carlos Castillo, Marcelo Mendoza, Barbara Poblete
CEAS
2011
Springer
12 years 7 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong