The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
We develop a theory for the temporal integration of visual motion motivated by psychophysical experiments. The theory proposes that input data are temporally grouped and used to p...
Alan L. Yuille, Pierre-Yves Burgi, Norberto M. Grz...
Adoption of the 10GbE Ethernet standard has been impeded by two important performance-oriented considerations: 1) processing requirements of common protocol stacks and 2) end-to-e...
Flooding is a growing problem, which affects more than 10% of the UK population. The cost of damage caused by flooding correlates closely with the warning time given before a floo...
Danny Hughes, Phil Greenwood, Gordon S. Blair, Geo...
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...