Sciweavers

9 search results - page 2 / 2
» How much anonymity does network latency leak
Sort
View
MSWIM
2004
ACM
13 years 10 months ago
Exploring long lifetime routing (LLR) in ad hoc networks
In mobile ad hoc networks, node mobility causes links between nodes to break frequently, thus terminating the lifetime of the routes containing those links. An alternative route h...
Zhao Cheng, Wendi Beth Heinzelman
ICDE
2001
IEEE
118views Database» more  ICDE 2001»
14 years 6 months ago
Tuning an SQL-Based PDM System in a Worldwide Client/Server Environment
The management of product-related data in a uniform and consistent way is a big challenge for many manufacturing enterprises, especially the large ones like DaimlerChrysler. So-ca...
Erich Müller, Jost Enderle, M. Feltes, Peter ...
CCR
2006
76views more  CCR 2006»
13 years 4 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
ECOOP
1998
Springer
13 years 9 months ago
Mobile Objects and Mobile Agents: The Future of Distributed Computing?
This paper will lead you into the world of mobile agents, an emerging technology that makes it very much easier to design, implement, and maintain distributed systems. You will fin...
Danny B. Lange