Sciweavers

278 search results - page 8 / 56
» Variants of Spreading Messages
Sort
View
IPPS
2008
IEEE
14 years 1 months ago
Heterogenous dating service with application to rumor spreading
Peer-to-Peer overlay networks have proven their efficiency for storing and retrieving data at large scale, but new services are required to take the actual performances of resour...
Olivier Beaumont, Philippe Duchon, Miroslaw Korzen...
TON
2008
89views more  TON 2008»
13 years 7 months ago
Probabilistic packet marking for large-scale IP traceback
This article presents an approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call randomize-and-link, uses large checksum cords to &...
Michael T. Goodrich
ICDCS
2011
IEEE
12 years 7 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
SOCINFO
2010
13 years 5 months ago
Measuring Message Propagation and Social Influence on Twitter.com
Although extensive studies have been conducted on online social networks (OSNs), it is not clear how to characterize information propagation and social influence, two types of impo...
Shaozhi Ye, Shyhtsun Felix Wu
GLOBECOM
2006
IEEE
14 years 1 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee