Sciweavers

8080 search results - page 362 / 1616
» From Computer Networks to Agent Networks
Sort
View
SIGCOMM
2009
ACM
15 years 11 months ago
On the evolution of user interaction in Facebook
Online social networks have become extremely popular; numerous sites allow users to interact and share content using social links. Users of these networks often establish hundreds...
Bimal Viswanath, Alan Mislove, Meeyoung Cha, P. Kr...
MOBIHOC
2007
ACM
16 years 4 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
136
Voted
SENSYS
2004
ACM
15 years 10 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
FOCS
2009
IEEE
15 years 11 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
SIGCOMM
2010
ACM
15 years 5 months ago
R3: resilient routing reconfiguration
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serio...
Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Y...