Sciweavers

302 search results - page 26 / 61
» Characterizing individual communication patterns
Sort
View
IMC
2006
ACM
15 years 3 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
ISQED
2003
IEEE
92views Hardware» more  ISQED 2003»
15 years 3 months ago
Parameterized Macrocells with Accurate Delay Models for Core-Based Designs
In this paper we propose a new design methodology targeted for core-based designs using parameterized macrocells (PMC’s). This methodology provides the flexibility for instance...
Makram M. Mansour, Mohammad M. Mansour, Amit Mehro...
INFOCOM
2009
IEEE
15 years 4 months ago
Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception
—This paper considers a slotted ALOHA random access system where users send packets to a common receiver with multipacket reception capability. A collection of m users access the...
Paolo Minero, Massimo Franceschetti
TPDS
2010
135views more  TPDS 2010»
14 years 8 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
NDSS
2006
IEEE
15 years 3 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...