PPT
1 The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena Polytechnic.
A Distributed Multimedia Data Management over the Grid Kasturi Chatterjee Distributed Multimedia Information System Laboratory School of Computing and.
Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
Scripting languages
Deterministic FTS Model for Forecasting Enrollments
CS 268: Routing Behavior in the Internet Ion Stoica February 18, 2003.
XPRESS: A Cross-Layer Backpressure Architecture for Wireless Multi-Hop Networks Rafael Laufer, Theodoros Salonidis, Henrik Lundgren, Pascal Le Guyadec.
Record Linkage/ Duplicate Elimination Sunita Sarawagi [email protected].
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
1 CS 561 Presentation: Indexing and Querying XML Data for Regular Path Expressions A Paper by Quanzhong Li and Bongki Moon Presented by Ming Li.
E2E Routing Behavior in the Internet Vern Paxson Sigcomm 1996 Slides are adopted from Ion Stoica’s lecture at UCB.