Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Micah Adler"'
Publikováno v:
IEEE/ACM Transactions on Networking. 21:69-83
Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of n no
Publikováno v:
Computer Networks. 55:4007-4020
Content Delivery Networks (CDNs) deliver web content to end-users from a large distributed platform of web servers hosted in data centers belonging to thousands of Internet Service Providers (ISPs) around the world. The bandwidth cost incurred by a C
Autor:
Brent Heeringa, Micah Adler
Publikováno v:
Algorithmica. 62:1112-1121
We give a (ln n+1)-approximation for the decision tree (DT) problem. An instance of DT is a set of m binary tests T=(T 1,…,T m ) and a set of n items X=(X 1,…,X n ). The goal is to output a binary tree where each internal node is a test, each lea
Publikováno v:
ACM Transactions on Information and System Security. 11:1-34
Using analysis, simulation, and experimentation, we examine the threat against anonymous communications posed by passive-logging attacks. In previous work, we analyzed the success of such attacks under various assumptions. Here, we evaluate the effec
Publikováno v:
Theory of Computing Systems. 42:465-487
It is proved that “FIFO” worksharing protocols provide asymptotically optimal solutions to two problems related to sharing large collections of independent tasks in a heterogeneous network of workstations (HNOW) $\mathcal{N}$. In the $\mathsf{HNO
Autor:
Dan Rubenstein, Micah Adler
Publikováno v:
ACM Transactions on Algorithms. 1:48-73
The problem of designing efficient algorithms for sharing the cost of multicasting has recently received considerable attention. In this article, we examine the effect on the complexity of pricing when two flexibility-enhancing mechanisms are incorpo
Autor:
Adi Rosén, Micah Adler
Publikováno v:
Journal of Algorithms. 55:101-112
A growing amount of work has been invested in recent years in analyzing packet-switching networks under worst-case scenarios rather than under probabilistic assumption. Most of this work makes use of the model of "adversarial queuing theory" proposed
Autor:
Micah Adler
Publikováno v:
Journal of the ACM. 52:217-244
There has been considerable recent interest in probabilistic packet marking schemes for the problem of tracing a sequence of network packets back to an anonymous source. An important consideration for such schemes is the number of packet header bits
Publikováno v:
ACM Transactions on Information and System Security. 7:489-522
There have been a number of protocols proposed for anonymous network communication. In this paper, we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator contin
Autor:
Neil Immerman, Micah Adler
Publikováno v:
LICS
We introduce a new Ehrenfeucht--Fraïssé game for proving lower bounds on the size of first-order formulas. Up until now, such games have only been used to prove bounds on the operator depth of formulas, not their size. We use this game to prove tha