Sciweavers

675 search results - page 79 / 135
» Anonymous communication in overlay networks
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 5 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 5 months ago
Multicast with an Application-Oriented Networking (AON) Approach
Abstract—This paper proposes an efficient and scalable multicast scheme based on the concept of application-oriented networking (AON). The traditional IP multicast is bandwidth ...
Xiaohua Tian, Yu Cheng, Kui Ren, Bin Liu
INFOCOM
2005
IEEE
15 years 4 months ago
Capturing accurate snapshots of the Gnutella network
— A common approach for measurement-based characterization of peer-to-peer (P2P) systems is to capture overlay snapshots using a crawler. The accuracy of captured snapshots by P2...
Daniel Stutzbach, Reza Rejaie
ICC
2008
IEEE
15 years 5 months ago
On the Investigation of Path Preference in End-to-End Network Measurements
— Overlay applications have used various tools to measure path properties in order to construct efficient overlay networks. Typical examples include delay measurement, connectiv...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
INFOCOM
2002
IEEE
15 years 3 months ago
Exploiting OTDM technology in WDM networks
— Wavelength routed optical networks allow to design a logical topology, comprising lightpaths and routers, which is overlayed on the physical topology, comprising optical fiber...
Marco Mellia, Emilio Leonardi, Marco Feletig, Robe...