Sciweavers

123 search results - page 20 / 25
» Selective Opening Security for Receivers
Sort
View
CCS
2005
ACM
15 years 3 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
CEAS
2004
Springer
15 years 3 months ago
Resisting SPAM Delivery by TCP Damping
Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to recei...
Kang Li, Calton Pu, Mustaque Ahamad
COMSWARE
2008
IEEE
15 years 4 days ago
Density-first Ad-hoc routing protocol for MANET
In recent years, Mobile Ad-hoc Networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. With open network archite...
Jiong Wang, Sirisha Medidi
CORR
2010
Springer
180views Education» more  CORR 2010»
14 years 10 months ago
A Network Coding Approach to Loss Tomography
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of in...
Athina Markopoulou, Christina Fragouli, Minas Gjok...
CN
2007
121views more  CN 2007»
14 years 10 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal