Sciweavers

257 search results - page 37 / 52
» A Taxonomy of Internet Communication Tools
Sort
View
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
INFOCOM
2011
IEEE
12 years 11 months ago
Estimating the performance of hypothetical cloud service deployments: A measurement-based approach
To optimize network performance, cloud service providers have a number of options available to them, including co-locating production servers in well-connected Internet eXchange (...
Angela Wang, Cheng Huang, Jin Li, Keith W. Ross
CCS
2006
ACM
13 years 11 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
INFOCOM
2010
IEEE
13 years 5 months ago
Netscope: Practical Network Loss Tomography
—We present Netscope, a tomographic technique that infers the loss rates of network links from unicast endto-end measurements. Netscope uses a novel combination of first- and se...
Denisa Ghita, Hung Xuan Nguyen, Maciej Kurant, Kat...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 10 days ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...