Sciweavers

1144 search results - page 71 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
PERCOM
2008
ACM
16 years 29 days ago
Composition and Generalization of Context Data for Privacy Preservation
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 8 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
INFOCOM
2002
IEEE
15 years 6 months ago
A Quantitative Assured Forwarding Service
— The Assured Forwarding (AF) service of the IETF DiffServ architecture provides a qualitative service differentiation between classes of traffic, in the sense that a low-priori...
Nicolas Christin, Jörg Liebeherr, Tarek F. Ab...
INFOCOM
2008
IEEE
15 years 7 months ago
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks
—The emerging broadband wireless access (BWA) technology based on IEEE 802.16 is one of the most promising solutions to provide ubiquitous wireless access to the broadband servic...
Eun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Se...
KBS
2007
76views more  KBS 2007»
15 years 1 months ago
What middleware for network centric operations?
The main intent of this paper is to address the issue of middleware in network centric operations. To this end, we characterize a set of Information Technology capabilities that s...
Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mou...