Sciweavers

9325 search results - page 286 / 1865
» The decentralized implementability problem
Sort
View
147
Voted
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 10 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 10 months ago
Optimality and Complexity of Opportunistic Spectrum Access: A Truncated Markov Decision Process Formulation
— We consider opportunistic spectrum access (OSA) which allows secondary users to identify and exploit instantaneous spectrum opportunities resulting from the bursty traffic of ...
Dejan V. Djonin, Qing Zhao, Vikram Krishnamurthy
132
Voted
IPPS
2007
IEEE
15 years 10 months ago
Creating a Robust Desktop Grid using Peer-to-Peer Services
The goal of the work described in this paper is to design and build a scalable infrastructure for executing grid applications on a widely distributed set of resources. Such grid i...
Jik-Soo Kim, Beomseok Nam, Michael A. Marsh, Peter...
IPPS
2007
IEEE
15 years 10 months ago
Adaptive Distributed Database Replication Through Colonies of Pogo Ants
We address the problem of optimizing the distribution of partially replicated databases over a computer network. Replication is used to increase data availability in the presence ...
Sarah Abdul-Wahid, Razvan Andonie, Joseph Lemley, ...
P2P
2007
IEEE
15 years 10 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer