Sciweavers

55 search results - page 2 / 11
» Notes On The Design Of An Internet Adversary
Sort
View
SIGMETRICS
2008
ACM
13 years 5 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
ENTCS
2007
132views more  ENTCS 2007»
13 years 5 months ago
Building Reputations for Internet Clients
We propose a design of a client reputation system that can be used to reduce unwanted traffic in the Internet. Many reputation systems proposed in the trust literature are provid...
Songjie Wei, Jelena Mirkovic
INFOCOM
2009
IEEE
13 years 12 months ago
Exploiting Internet Delay Space Properties for Selecting Distinct Network Locations
—Recent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures and constrained ...
Bo Zhang, T. S. Eugene Ng
DIAU
2000
Springer
13 years 9 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
WWW
2001
ACM
14 years 6 months ago
LiteMinutes: an Internet-based system for multimedia meeting minutes
The Internet provides a highly suitable infrastructure for sharing multimedia meeting records, especially as multimedia technologies become more lightweight and workers more mobil...
Patrick Chiu, John S. Boreczky, Andreas Girgensohn...