Sciweavers

1275 search results - page 192 / 255
» Communication Network Analysis of the Enterprise Grid System...
Sort
View
CCS
2009
ACM
15 years 4 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
P2P
2009
IEEE
126views Communications» more  P2P 2009»
15 years 4 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
SIGOPSE
1992
ACM
15 years 1 months ago
Names should mean what, not where
Abstract-- This paper describes the design and implementation1 of IRIS: an intentional resource indicator service. IRIS springs from the concept that end-users should not be bogged...
James O'Toole, David K. Gifford
100
Voted
ICASSP
2011
IEEE
14 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ACMSE
2007
ACM
15 years 1 months ago
CluVis: dual-domain visual exploration of cluster/network metadata
CluVis, a prototype for visual monitoring and exploration of cluster and network metadata, is introducted. CluVis builds upon interactively added charts of cluster/network metadat...
Christopher Waters, Jonathan Howell, T. J. Jankun-...