Sciweavers

1447 search results - page 219 / 290
» Simulating Internet Worms
Sort
View
AINA
2008
IEEE
15 years 1 months ago
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
BitTorrent is one of the most well known peer-topeer file sharing applications, accounting for a significant proportion of Internet traffic. Current BitTorrent system builds its o...
Wei Li, Shanzhi Chen, Tao Yu
CCS
2008
ACM
15 years 1 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
CONEXT
2008
ACM
15 years 1 months ago
ISP-friendly peer matching without ISP collaboration
In peer-to-peer (P2P) systems, a receiver needs to be matched with multiple senders, because peers have limited capacity and reliability. Efficient peer matching can reduce the co...
Cheng-Hsin Hsu, Mohamed Hefeeda
FGCN
2007
IEEE
148views Communications» more  FGCN 2007»
15 years 1 months ago
Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh Networks
Recently, Voice over IP (VoIP) has become an important service for the future internet. However, for ubiquitous wireless VoIP services, greater coverage will be necessary as promi...
Marcel C. Castro, Peter Dely, Jonas Karlsson, Andr...
AAAI
2010
15 years 1 months ago
Modeling Dynamic Multi-Topic Discussions in Online Forums
In the form of topic discussions, users interact with each other to share knowledge and exchange information in online forums. Modeling the evolution of topic discussion reveals h...
Hao Wu, Jiajun Bu, Chun Chen, Can Wang, Guang Qiu,...