Sciweavers

537 search results - page 61 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
95
Voted
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 6 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
SIGCOMM
2010
ACM
14 years 11 months ago
Accelerating SSL with GPUs
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
88
Voted
INFOCOM
2000
IEEE
15 years 3 months ago
On Service Models for Multicast Transmission in Heterogeneous Environments
– We examine in this paper the tradeoff between application complexity, network complexity, and network efficiency. We argue that the design of the current Internet reflects a ...
Matthias Grossglauser, Jean-Chrysostome Bolot
IAT
2006
IEEE
15 years 5 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
86
Voted
ETFA
2005
IEEE
15 years 4 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver