Sciweavers

2500 search results - page 314 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
NOSSDAV
2009
Springer
15 years 5 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
SIGCOMM
2009
ACM
15 years 5 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
SIGCOMM
2009
ACM
15 years 5 months ago
Pathlet routing
Source-controlled multipath routing can be highly beneficial to both sources and to network providers. For a source, the flexibility to choose among multiple paths can improve r...
Brighten Godfrey, Igor Ganichev, Scott Shenker, Io...
DSN
2008
IEEE
15 years 5 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
BROADNETS
2007
IEEE
15 years 5 months ago
Modeling and performance analysis of an improved DCF-based mechanism under noisy channel
The ISM free-licence band is highly used by wireless technologies such IEEE 802.11, Bluetooth as well as private wireless schemes. This huge utilisation increases dramatically the ...
Adlen Ksentini, Marc Ibrahim