Sciweavers

2808 search results - page 39 / 562
» Routing betweenness centrality
Sort
View
OSDI
2006
ACM
16 years 5 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
MOBICOM
2003
ACM
15 years 10 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 11 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
PAM
2010
Springer
15 years 11 months ago
A Measurement Study of the Origins of End-to-End Delay Variations
The end-to-end (e2e) stability of Internet routing has been studied for over a decade, focusing on routes and delays. This paper presents a novel technique for uncovering the origi...
Yaron Schwartz, Yuval Shavitt, Udi Weinsberg
CSFW
2010
IEEE
15 years 8 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...