Sciweavers

123 search results - page 9 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
WINE
2010
Springer
148views Economy» more  WINE 2010»
14 years 7 months ago
False-Name-Proofness in Social Networks
In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave stra...
Vincent Conitzer, Nicole Immorlica, Joshua Letchfo...
PIMRC
2008
IEEE
15 years 4 months ago
Multihop-enabled orthogonalization in Distributed MIMO Networks
—It has recently been proposed to orthogonalize the data streams of n interfering source-destination pairs by employing an intermediate stage of non-cooperating coherent amplify-...
Jörg Wagner, Marc Kuhn, Armin Wittneben
INFOCOM
2010
IEEE
14 years 8 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 4 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu