Sciweavers

438 search results - page 63 / 88
» The forest hiding problem
Sort
View
PET
2007
Springer
15 years 6 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
UIC
2007
Springer
15 years 6 months ago
Context-Aware Service Composition for Mobile Network Environments
Recent advances in wireless and mobile networking technology pose a new set of requirements and challenges that are not previously thought of, when it comes to smart space middlewa...
Choonhwa Lee, Sunghoon Ko, Seungjae Lee, Wonjun Le...
GLOBECOM
2006
IEEE
15 years 5 months ago
TCP Performance Improvement through Inter-layer Enhancement with Mobile IPv6
— To enable higher layer transparent, Mobile IPv6 (MIPv6) hides mobility from the transport layer such as TCP, but it has serious implications on TCP due to mobility issues inclu...
Deguang Le, Donghui Guo, Boxi Wu
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 5 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
IISWC
2006
IEEE
15 years 5 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...