Sciweavers

405 search results - page 14 / 81
» Linking and Messaging from Real Paper in the Paper PDA
Sort
View
CCS
2008
ACM
14 years 11 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
MOBICOM
2009
ACM
15 years 4 months ago
Order matters: transmission reordering in wireless networks
Modern wireless interfaces support a physical layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception, and engage ...
Justin Manweiler, Naveen Santhapuri, Souvik Sen, R...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 4 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
ICIAP
2003
ACM
15 years 9 months ago
View synthesis from uncalibrated images using parallax
This work deals with the view synthesis problem, i.e., how to generate snapshots of a scene taken from a "virtual" viewpoint different from all the viewpoints of the rea...
Andrea Fusiello, Stefano Caldrer, Sara Ceglie, Nik...
DSN
2007
IEEE
15 years 4 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble