Sciweavers

5079 search results - page 247 / 1016
» Hidden-Action in Network Routing
Sort
View
CN
2007
109views more  CN 2007»
14 years 11 months ago
Describing and simulating internet routes
This contribution deals with actual routes followed by packets on the internet at IP level. We first propose a set of statistical properties to analyse such routes, which brings ...
Jeremie Leguay, Matthieu Latapy, Timur Friedman, K...
76
Voted
CORR
2010
Springer
58views Education» more  CORR 2010»
14 years 9 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
VTC
2008
IEEE
165views Communications» more  VTC 2008»
15 years 5 months ago
Operation and Performance of Vehicular Ad-Hoc Routing Protocols in Realistic Environments
—Vehicle-to-vehicle and vehicle-to-infrastructure wireless communications are currently under development to improve traffic efficiency and safety. Routing protocols enabling mul...
Ramon Bauza, Javier Gozálvez, Miguel Sepulc...
ICDCSW
2005
IEEE
15 years 4 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
DIAU
2000
Springer
15 years 3 months ago
The Disadvantages of Free MIX Routes and how to Overcome Them
There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two sp...
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke