Sciweavers

94 search results - page 8 / 19
» Convex analysis of generalized flow networks
Sort
View
CCS
2008
ACM
14 years 11 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 3 months ago
Using pair approximations to predict takeover dynamics in spatially structured populations
The topological properties of a network directly impact the flow of information through a system. For example, in natural populations, the network of inter-individual contacts aff...
Joshua L. Payne, Margaret J. Eppstein
PIMRC
2010
IEEE
14 years 7 months ago
Energy-delay tradeoff analysis in embedded M2M networks with channel coding
Abstract--Machine-to-Machine (M2M), an emerging communications paradigm, is a facilitator of data flows between machines used, e.g., in mission-critical applications. Focusing in t...
Tatjana Predojev, Jesus Alonso-Zarate, Mischa Dohl...
MOBICOM
1999
ACM
15 years 1 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph