Sciweavers

1256 search results - page 110 / 252
» A Simple E-Voting Protocol
Sort
View
APNOMS
2008
Springer
15 years 7 months ago
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...
CN
2006
56views more  CN 2006»
15 years 5 months ago
Maximizing remote work in flooding-based peer-to-peer systems
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Qixiang Sun, Neil Daswani, Hector Garcia-Molina
ICUMT
2009
15 years 2 months ago
Moving data in DTNs with HTTP and MIME
Multipurpose Internet Mail Extensions (MIME) provide a simple way to describe the type of data sent and its use. Email and the web use MIME extensively to carry different files. Th...
Lloyd Wood, Peter Holliday, Daniel Floreani, Ioann...
CSFW
2009
IEEE
15 years 11 months ago
A Method for Proving Observational Equivalence
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
Véronique Cortier, Stéphanie Delaune
IPPS
2008
IEEE
15 years 11 months ago
Self-stabilizing population of mobile agents
We investigate a problem of maintaining a target population of mobile agents in a distributed system. The purpose of the agents is to perform certain activities, so the goal is to...
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz ...