Sciweavers

1030 search results - page 59 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
PDP
2005
IEEE
15 years 3 months ago
Rendezvous: An Alternative Approach to Conflict Resolution for Real Time Multi-User Applications
Up until now little support has been provided for shared state systems in environments with highly unpredictable network connections, such as mobile networks. Shared state conflic...
Angie Chandler, Joe Finney
NDSS
2006
IEEE
15 years 3 months ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
SRDS
2005
IEEE
15 years 3 months ago
Consistency Management among Replicas in Peer-to-Peer Mobile Ad Hoc Networks
Recent advances in wireless communication along with Peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environ...
Takahiro Hara, Sanjay Kumar Madria
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
15 years 10 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
COMSWARE
2008
IEEE
15 years 4 months ago
A reality check on sip-based streaming applications on the next generation mobile test network
— The telecom and the internet world is converging towards all-IP network architecture and the operators are keen to provide innovative multimedia services coupled with advanced ...
Chitra Balakrishna, Khalid Al-Begain