Sciweavers

198 search results - page 16 / 40
» An Effective Characterization of Computability in Anonymous ...
Sort
View
IMC
2006
ACM
15 years 3 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
69
Voted
MINENET
2005
ACM
15 years 3 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...
WCNC
2008
IEEE
15 years 4 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
BROADNETS
2007
IEEE
15 years 4 months ago
MIST: Cellular data network measurement for mobile applications
— The rapid growth in the popularity of cellular networks has led to aggressive deployment and a rapid expansion of services. Services based on the integration of these networks ...
Mike P. Wittie, Brett Stone-Gross, Kevin C. Almero...
WWW
2003
ACM
15 years 10 months ago
Web browsing performance of wireless thin-client computing
Web applications are becoming increasingly popular for mobile wireless systems. However, wireless networks can have high packet loss rates, which can degrade web browsing performa...
S. Jae Yang, Jason Nieh, Shilpa Krishnappa, Aparna...