Sciweavers

537 search results - page 61 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 8 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
86
Voted
SIGCOMM
2010
ACM
15 years 24 days ago
Accelerating SSL with GPUs
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
INFOCOM
2000
IEEE
15 years 5 months ago
On Service Models for Multicast Transmission in Heterogeneous Environments
– We examine in this paper the tradeoff between application complexity, network complexity, and network efficiency. We argue that the design of the current Internet reflects a ...
Matthias Grossglauser, Jean-Chrysostome Bolot
100
Voted
IAT
2006
IEEE
15 years 6 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
ETFA
2005
IEEE
15 years 6 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver