Sciweavers

480 search results - page 71 / 96
» Anonymous Transactions in Computer Networks
Sort
View
120
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Route diversity: A future for transmission protocols?
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanec...
126
Voted
CJ
2010
131views more  CJ 2010»
15 years 28 days ago
Turning Back Time - What Impact on Performance?
Consistent with the divide-and-conquer approach to problem solving, a recursive result is presented in the domain of stochastic modelling that derives product-form solutions for t...
Peter G. Harrison
113
Voted
IPPS
2000
IEEE
15 years 8 months ago
Self-Stabilizing Mutual Exclusion Using Unfair Distributed Scheduler
A self-stabilizing algorithm, regardless of the initial system state, converges in finite time to a set of states that satisfy a legitimacy predicate without the need for explici...
Ajoy Kumar Datta, Maria Gradinariu, Sébasti...
125
Voted
COLCOM
2005
IEEE
15 years 9 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz
127
Voted
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
16 years 4 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...