-
1
-
-
0036474458
-
Fair queuing and other probabilistic allocation methods
-
Herv Moulin and Richard Stong, "Fair queuing and other probabilistic allocation methods," Mathematics of Operations Research, vol. 27, no. 1, pp. 1-30, 2002.
-
(2002)
Mathematics of Operations Research
, vol.27
, Issue.1
, pp. 1-30
-
-
Moulin, H.1
Stong, R.2
-
2
-
-
0023329886
-
On packet switches with infinite storage
-
April
-
J. Nagel, "On Packet Switches with Infinite Storage ," IEEE Transactions on Communications, vol. 35, pp. 435-438, April 1987.
-
(1987)
IEEE Transactions on Communications
, vol.35
, pp. 435-438
-
-
Nagel, J.1
-
4
-
-
0026223925
-
Round robin scheduling for max-min fairness in data networks
-
Sept.
-
Ellen L. Hahne, "Round Robin Scheduling for Max-Min Fairness in Data Networks," IEEE Journal on selected areas in communication, vol. 9, no. 7, pp. 1024-1039, Sept. 1991.
-
(1991)
IEEE Journal on Selected Areas in Communication
, vol.9
, Issue.7
, pp. 1024-1039
-
-
Hahne, E.L.1
-
5
-
-
0024889726
-
Analysis and simulation of a fair queueing algorithm
-
August
-
A. Demers, S. Keshav, and S. Shenker, "Analysis and simulation of a fair queueing algorithm," SIGCOMM Comput. Commun. Rev., vol. 19, pp. 1-12, August 1989.
-
(1989)
SIGCOMM Comput. Commun. Rev.
, vol.19
, pp. 1-12
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
6
-
-
0038650844
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Pittsburg, PA, April
-
A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proceedings of 4th International Information Hiding Workshop, Pittsburg, PA, April 2001.
-
(2001)
Proceedings of 4th International Information Hiding Workshop
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
8
-
-
84868547707
-
-
New York : Scribner, c1996, New York, NY
-
David Kahn, The Codebreakers: The Story of Secret W riting, New York : Scribner, c1996, New York, NY, 1974.
-
(1974)
The Codebreakers: The Story of Secret W Riting
-
-
David, K.1
-
10
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
Berkeley, CA, USA, , SSYM'OI, USENIX Association.
-
Dawn Xiaodong Song, David Wagner, and Xuqing Tian, "Timing analysis of keystrokes and timing attacks on ssh," in Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, Berkeley, CA, USA, 2001, SSYM'OI, pp. 25-25, USENIX Association.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium-Volume 10
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
12
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
13
-
-
27544454707
-
Low-cost traffic analysis of tor
-
Washington, DC, USA, , IEEE Computer Society.
-
Steven J. Murdoch and George Danezis, "Low-cost traffic analysis of tor," in Proceedings of the 2005 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2005, pp. 183-195, IEEE Computer Society.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
14
-
-
84871990686
-
Anonymity of mix networks under light traffic conditions
-
IL, October
-
P. Venkitasubramaniam and V. Anantharam, "Anonymity of Mix Networks under Light Traffic Conditions," in Proceedings of the 36th Allerton Coni on Communications, Control, and Computing, Monticello, IL, October 2008.
-
(2008)
Proceedings of the 36th Allerton Coni on Communications, Control, and Computing, Monticello
-
-
Venkitasubramaniam, P.1
Anantharam, V.2
-
15
-
-
77955412844
-
Approximation for a two-class weighted fair queueing discipline
-
October
-
John F. Shortie and Martin J. Fischer, "Approximation for a two-class weighted fair queueing discipline," Petform. Eval., vol. 67, pp. 946-958, October 2010.
-
(2010)
Petform. Eval.
, vol.67
, pp. 946-958
-
-
Shortie, J.F.1
Fischer, M.J.2
-
16
-
-
0342494485
-
-
Tech. Rep., Santa Cruz, CA, USA
-
Dimitrios Stiliadis and Anujan Varma, "Latency-rate servers: A general model for analysis of traffic scheduling algorithms," Tech. Rep., Santa Cruz, CA, USA, 1995.
-
(1995)
Latency-rate Servers: A General Model for Analysis of Traffic Scheduling Algorithms
-
-
Stiliadis, D.1
Varma, A.2
-
19
-
-
0000861722
-
A proof for the queuing formula l = '\'w
-
May
-
John D. C. Little, "A Proof for the Queuing Formula L = '\'W," Operations Research: A Journal of the Institute for Operations Research and the Management Sciences, vol. 9, no. 3, pp. 383-387, May 1961.
-
(1961)
Operations Research: A Journal of the Institute for Operations Research and the Management Sciences
, vol.9
, Issue.3
, pp. 383-387
-
-
John, D.C.1
Little2
|