Sciweavers

14098 search results - page 212 / 2820
» Crowd computer interaction
Sort
View
120
Voted
NDSS
2002
IEEE
15 years 8 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
155
Voted
EUROPAR
2006
Springer
15 years 7 months ago
DOH: A Content Delivery Peer-to-Peer Network
Many SMEs and non-profit organizations suffer when their Web servers become unavailable due to flash crowd effects when their web site becomes popular. One of the solutions to the ...
Jimmy Jernberg, Vladimir Vlassov, Ali Ghodsi, Seif...
LISA
2007
15 years 6 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
NSDI
2004
15 years 5 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer
127
Voted
CONEXT
2009
ACM
15 years 5 months ago
Content availability and bundling in swarming systems
BitTorrent, the immensely popular file swarming system, suffers a fundamental problem: content unavailability. Although swarming scales well to tolerate flash crowds for popular c...
Daniel Sadoc Menasché, Antonio Augusto de A...