Sciweavers

242 search results - page 44 / 49
» A New Self-Routing Multicast Network
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 8 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
CISS
2008
IEEE
14 years 5 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman
ICNP
1998
IEEE
14 years 3 months ago
Signaling for Internet Telephony
Internet telephony must offer the standard telephony services. However, the transition to Internetbased telephony services also provides an opportunity to create new services more...
Henning Schulzrinne, Jonathan D. Rosenberg
GROUP
1997
ACM
14 years 3 months ago
The CDT mStar environment: scalable distributed teamwork in action
This paper presents the mStar environment, which creates an environment for truly scalable distributed teamwork. It can be and is being used on a daily basis for electronic meetin...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
INFOCOM
2003
IEEE
14 years 4 months ago
A Framework for Incremental Deployment Strategies for Router-Assisted Services
— Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed in the routers. First, an incrementally deployabl...
Xinming He, Christos Papadopoulos, Pavlin Radoslav...