Sciweavers

182 search results - page 19 / 37
» Survey on anonymous communications in computer networks
Sort
View
ISCAS
2005
IEEE
149views Hardware» more  ISCAS 2005»
15 years 3 months ago
Advances in QoS path(s) selection problem
— In this paper we provide a survey of three classes of combinatorial optimization problems that arise in communication network analysis. These problems, referred to as QoS (Qual...
Krishnaiyan Thulasiraman, Ying Xiao, Guoliang Xue
WMCSA
2002
IEEE
15 years 2 months ago
The Location Stack: A Layered Model for Location in Ubiquitous Computing
Based on five design principles extracted from a survey of location systems, we present the Location Stack, a layered software engineering model for location in ubiquitous comput...
Jeffrey Hightower, Barry Brumitt, Gaetano Borriell...
CSE
2009
IEEE
15 years 4 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
GLOBECOM
2010
IEEE
14 years 7 months ago
GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers
Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with th...
Dzmitry Kliazovich, Pascal Bouvry, Yury Audzevich,...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang