Sciweavers

1551 search results - page 66 / 156
» Privacy-Preserving Network Aggregation
Sort
View
68 views 82 votes 15 years 1 months ago  TOSN 2010»
86 views 99 votes 15 years 1 months ago  WICOMM 2010»
205 views 125 votes 16 years 5 days ago  SOSP 2001»
In most distributed systems, naming of nodes for low-level communication leveragestopologicallocation(such as node addresses) and is independentof any application. In this paper, ...
122 views 102 votes 15 years 3 months ago  WICOMM 2008»
This paper explores the logical device aggregation of terminals in future generation networks, where the availability of several different radio access techniques is integrated by...
147 views 128 votes 15 years 7 months ago  RAID 2001»
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
116 views 116 votes 15 years 9 months ago  TRIDENTCOM 2008»
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
112 views 108 votes 15 years 8 months ago  WMCSA 2002»
MOPED (MObile grouPEd Device) is a network model that treats a user’s set of personal devices as a single, virtual device. The nodes of the MOPED dynamically aggregate available...
113 views 110 votes 15 years 7 months ago  GI 2001»
Abstract: This paper presents the information aggregation methods enabling cost- and QoS-aware service deployment. It is expected that network management tools will require the net...
153 views 127 votes 15 years 4 months ago  SNPD 2008»
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...