Sciweavers

675 search results - page 81 / 135
» Anonymous communication in overlay networks
Sort
View
SIGCOMM
2000
ACM
15 years 3 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
INFOCOM
2008
IEEE
15 years 5 months ago
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...
Feng Wang, Jiangchuan Liu, Yongqiang Xiong
GLOBECOM
2007
IEEE
15 years 5 months ago
On the Design of Future Wireless Ad Hoc Networks
— In this paper, we study the design of future wireless ad hoc networks. Particularly, we consider that the future wireless ad hoc networks shall be able to efficiently provide ...
Kejie Lu, Shengli Fu, Tao Zhang, Yi Qian
INFOCOM
2009
IEEE
15 years 5 months ago
Exploiting Internet Delay Space Properties for Selecting Distinct Network Locations
—Recent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures and constrained ...
Bo Zhang, T. S. Eugene Ng
INFOCOM
2010
IEEE
14 years 9 months ago
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces
In this paper we show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. The hyperbolic geometry can be used to facilitate maximally ef...
Fragkiskos Papadopoulos, Dmitri V. Krioukov, Mari&...