Sciweavers

7329 search results - page 1209 / 1466
» Network Extractor Protocols
Sort
View
SPAA
2003
ACM
15 years 10 months ago
Information gathering in adversarial systems: lines and cycles
In this paper we consider the problem of routing packets to a single destination in a dynamically changing network, where both the network and the packet injections are under adve...
Kishore Kothapalli, Christian Scheideler
162
Voted
CONEXT
2005
ACM
15 years 6 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
VLDB
2009
ACM
147views Database» more  VLDB 2009»
16 years 4 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...
P2P
2006
IEEE
122views Communications» more  P2P 2006»
15 years 10 months ago
2Fast : Collaborative Downloads in P2P Networks
P2P systems that rely on the voluntary contribution of bandwidth by the individual peers may suffer from freeriding. To address this problem, mechanisms enforcing fairness in band...
Pawel Garbacki, Alexandru Iosup, Dick H. J. Epema,...
127
Voted
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
15 years 10 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
« Prev « First page 1209 / 1466 Last » Next »