• Aucun résultat trouvé

[PDF] Top 20 An architecture for an anonymity network

Has 10000 "An architecture for an anonymity network" found on our website. Below are the top 20 most common "An architecture for an anonymity network".

An architecture for an anonymity network

An architecture for an anonymity network

... provides anonymity for delay-sensitive services such as Web ...of anonymity at the cost of a high bandwidth ...the architecture of our prototype implementa- tion of an anonymity ... Voir le document complet

6

Basic Abstractions for an Autonomic Network Architecture

Basic Abstractions for an Autonomic Network Architecture

... (Autonomic Network Architecture) project aims at providing a framework to flexibly host, interconnect, and federate multiple heterogeneous networks in an autonomic way, ...strive for a maximum ... Voir le document complet

6

Analysis of an Anonymity Network for Web Browsing.

Analysis of an Anonymity Network for Web Browsing.

... of an APs is to hide the correlation of incoming and outgoing messages such that an attacker that performs traffic analysis to break the anonymity cannot follow a mes- sage through the ...exiting ... Voir le document complet

6

Ufa : an ultra flat architecture for future mobile networks

Ufa : an ultra flat architecture for future mobile networks

... vital network part and one of the most dimensioning ...cause an important UFA cost, as by duplicating the UFA_GWs due to connectivity criterion, UFA intelligence may be duplicated unnecessarily (we may have ... Voir le document complet

227

Optical home network based on an NxN multimode fiber architecture and CWDM technology

Optical home network based on an NxN multimode fiber architecture and CWDM technology

... ⑤). For each application, Optical Add & Drop Multiplexers (OADM) designed for MMF were used to select the dedicated ...and for which no filter was available at this ...budget for the ... Voir le document complet

4

Depicting the genetic architecture of pediatric cancers through an integrative gene network approach

Depicting the genetic architecture of pediatric cancers through an integrative gene network approach

... the network-based analysis of RNA-Seq data of six pediatric can- cer types to provide a novel biological framework for investigating genes involved in childhood ... Voir le document complet

16

Anonymity properties of two network coded gossip protocols

Anonymity properties of two network coded gossip protocols

... a network of four clouds with six nodes inside 5.5.1 CHAP Anonymity CHAP uses NCGAB, and by the hierarchical separability presented in ...that for a wireline-only adversary CHAP is at least as ... Voir le document complet

114

An MDC-based video streaming architecture for mobile networks

An MDC-based video streaming architecture for mobile networks

... producing an overlay mismatched ...designed for video streaming in ad-hoc wireless networks, which exploits the broadcast property of the medium in a cross-layered ...tree for each ...mechanism ... Voir le document complet

7

An Arduino compatible CAN Bus architecture for sailing applications

An Arduino compatible CAN Bus architecture for sailing applications

... for sailing applications K´evin Bruget, Benoˆıt Clement, Olivier Reynet and Bernt Weber Abstract This paper describes a Controller Area Network (CAN) Bus architecture based on Arduino compatible ... Voir le document complet

14

μNDN: an Orchestrated Microservice Architecture for Named Data Networking

μNDN: an Orchestrated Microservice Architecture for Named Data Networking

... the network, resulting in an average throughput of 635 Mbps limited by the Back- ward Router (BR1, which has reached its CPU capacity of ...Mbps for a scaling factor of 2 (when ...setting an ... Voir le document complet

13

Architecture for programmable network infrastructure

Architecture for programmable network infrastructure

... allow for other implementations in- cluding hardware ones), extracting packet header classification to a unified parser but no stream abstraction or re-use of session parsing, ...provide an abstraction to ... Voir le document complet

237

An Auto-Adaptative Reconfigurable Architecture for the Control

An Auto-Adaptative Reconfigurable Architecture for the Control

... reconfigurable architecture, control parallelism 1 Introduction The silicon area of reconfigurable devices are filled with a large number of com- puting primitives, interconnected via a configurable ...our ... Voir le document complet

17

An architecture and a process for implementing distributed collaborations

An architecture and a process for implementing distributed collaborations

... algorithms for communication among remote compo- nents can be highly dependent on non-functional constraints (from the point of view of the “interaction semantics”): the location and number of interacting ... Voir le document complet

13

An ITS-based Architecture for Opportunistic Networking

An ITS-based Architecture for Opportunistic Networking

... such an envi- ronment, the process to select the best suited communication profile and path for each data flow presents some ...process. For example, applications can request a specific bandwidth, ... Voir le document complet

7

An Architecture for Autonomy

An Architecture for Autonomy

... representation for specifying and programming models of the robot tasks at the abstraction level required for ...task network representation (HTN), whereas Ix T eT favors the partial-plan space ... Voir le document complet

39

An architecture for networked multimedia

An architecture for networked multimedia

... The Network Multimedia Information Services (NMIS) Media Distribution Architecture uses HTTP as the main protocol for transferring data between systems on the Internet, and HTTP servers[r] ... Voir le document complet

49

An Experimental Study and Analysis of Crowds based Anonymity

An Experimental Study and Analysis of Crowds based Anonymity

... this architecture, the adversary can observe the server receiving ...the anonymity goals that the crowds achieve include sender anonymity, receiver anonymity and as well as the unlink-ability ... Voir le document complet

6

An architecture for pseudonymous e-commerce

An architecture for pseudonymous e-commerce

... Pseudonymity Network As seen in section 2, customers must not send data di- rectly from their computer to the destination Web site since this would expose their IP ...case for many office and univer- sity ... Voir le document complet

9

An Agent-Based Architecture for Personalized Recommendations

An Agent-Based Architecture for Personalized Recommendations

... agent architecture with additional reasoning ...BDI architecture with a social context in which sim- ilar agents can communicate and influence each other to adopt mental ...social network based on ... Voir le document complet

19

Towards An Avatar Architecture for the Web of Things

Towards An Avatar Architecture for the Web of Things

... goal, an avatar do not generally need collective features. If an avatar has all the skills to accomplish a task but if the resources are not sufficient, it will be in a situation of ...if an avatar ... Voir le document complet

7

Show all 10000 documents...