Sciweavers

123 search results - page 9 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
WINE
2010
Springer
148views Economy» more  WINE 2010»
14 years 11 months ago
False-Name-Proofness in Social Networks
In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave stra...
Vincent Conitzer, Nicole Immorlica, Joshua Letchfo...
PIMRC
2008
IEEE
15 years 8 months ago
Multihop-enabled orthogonalization in Distributed MIMO Networks
—It has recently been proposed to orthogonalize the data streams of n interfering source-destination pairs by employing an intermediate stage of non-cooperating coherent amplify-...
Jörg Wagner, Marc Kuhn, Armin Wittneben
INFOCOM
2010
IEEE
15 years 9 days ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
116
Voted
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 8 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu