Sciweavers

480 search results - page 55 / 96
» Anonymous Transactions in Computer Networks
Sort
View
112
Voted
SAC
2002
ACM
15 years 3 days ago
Concurrency control for distributed cooperative engineering applications
Distributed cooperative engineering applications require consistent and long-term sharing of large volumes of data, which may cause conflicts due to concurrent read/write operatio...
João Coelho Garcia, Paulo Ferreira
82
Voted
CCS
2009
ACM
15 years 7 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
113
Voted
PERCOM
2010
ACM
14 years 10 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling
SOFTVIS
2006
ACM
15 years 6 months ago
The Clack graphical router: visualizing network software
We present Clack, a graphical environment for teaching students how Internet routers work and other core networking concepts. Clack is a router written as a Java Applet, and route...
Dan Wendlandt, Martin Casado, Paul Tarjan, Nick Mc...
115
Voted
DIMVA
2011
14 years 4 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...