Sciweavers

182 search results - page 22 / 37
» Survey on anonymous communications in computer networks
Sort
View
86
Voted
CSE
2009
IEEE
15 years 4 months ago
The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing Games
— We examine the social behaviors of game experts in Everquest II, a popular massive multiplayer online role-playing game (MMO). We rely on Exponential Random Graph Models (ERGM)...
David Huffaker, Jing (Annie) Wang, Jeffrey William...
CCS
2008
ACM
14 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
MIDDLEWARE
2007
Springer
15 years 3 months ago
On the integration of sensor networks and general purpose IT infrastructure
Integrating sensor networks with general purpose IT infrastructure has been confirmed as a complex problem in the development and management of industrial sensor applications. Th...
Wouter Horré, Sam Michiels, Nelson Matthys,...
AINA
2007
IEEE
14 years 11 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
ICSNC
2007
IEEE
15 years 4 months ago
Programming Approaches and Challenges for Wireless Sensor Networks
Wireless sensor networks (WSNs) constitute a new pervasive and ubiquitous technology. They have been successfully used in various application areas and in future computing environ...
Bartolomé Rubio, Manuel Díaz, Jos&ea...