Sciweavers

310 search results - page 36 / 62
» An Improved Internet Voting Protocol
Sort
View
IMC
2006
ACM
15 years 7 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
WSDM
2010
ACM
266views Data Mining» more  WSDM 2010»
15 years 11 months ago
Gathering and Ranking Photos of Named Entities with High Precision, High Recall, and Diversity
Knowledge-sharing communities like Wikipedia and automated extraction methods like those of DBpedia enable the construction of large machine-processible knowledge bases with relat...
Bilyana Taneva, Mouna Kacimi, Gerhard Weikum
COMCOM
2002
68views more  COMCOM 2002»
15 years 1 months ago
A performance study of RSVP with proposed extensions
Resource ReSerVation Protocol (RSVP) was developed as an intended key component for the evolving Internet, and in particular for the Integrated Services architecture. Therefore, R...
Laurent Mathy, David Hutchison, Stefan Schmid, Ste...
SIGCOMM
2009
ACM
15 years 8 months ago
Pathlet routing
Source-controlled multipath routing can be highly beneficial to both sources and to network providers. For a source, the flexibility to choose among multiple paths can improve r...
Brighten Godfrey, Igor Ganichev, Scott Shenker, Io...
TPDS
2008
231views more  TPDS 2008»
15 years 1 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino