Sciweavers

198 search results - page 36 / 40
» A Comparison of Reliable Multicast Protocols
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
Policy-based routing with non-strict preferences
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. S...
Chi-kin Chau
ESEC
1997
Springer
13 years 11 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
ICWMC
2006
IEEE
14 years 1 months ago
Design and Evaluation of eTIMIP - an Overlay Micro-Mobility Architecture based on TIMIP
All the proposed IP mobility protocols assume that the mobile nodes always have a mobility-aware IP stack. On the other hand, efficient micro-mobility solutions entail specific to...
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
ICNS
2007
IEEE
14 years 1 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 1 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl