Sciweavers

3483 search results - page 139 / 697
» Forward
Sort
View
123
Voted
DISCEX
2003
IEEE
15 years 9 months ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...
159
Voted
ICPP
2003
IEEE
15 years 9 months ago
On Maximizing Lifetime of Multicast Trees in Wireless Ad hoc Networks
This paper presents a distributed algorithm called LREMiT for extending the lifetime of a source-based multicast tree in wireless ad hoc networks (WANET). The lifetime of a multic...
Bin Wang, Sandeep K. S. Gupta
155
Voted
ISCA
2003
IEEE
93views Hardware» more  ISCA 2003»
15 years 9 months ago
Improving Dynamic Cluster Assignment for Clustered Trace Cache Processors
This work examines dynamic cluster assignment for a clustered trace cache processor (CTCP). Previously proposed cluster assignment techniques run into unique problems as issue wid...
Ravi Bhargava, Lizy Kurian John
159
Voted
ADHOCNOW
2003
Springer
15 years 9 months ago
A Uniform Continuum Model for Scaling of Ad Hoc Networks
This paper models an ad-hoc network as a continuum of nodes, ignoring edge effects, to find how the traffic scales with N, the number of nodes. We obtain expressions for the traffi...
Ernst W. Grundke, A. Nur Zincir-Heywood
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 8 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino