Sciweavers

198 search results - page 11 / 40
» A practical algorithm for constructing oblivious routing sch...
Sort
View
EUC
2004
Springer
15 years 9 months ago
VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity
High heterogeneity is an unignoring factor for large-scale peer-to-peer system which leads to the born of VChord. VChord is a peer-to-peer overlay network constructed on Chord aime...
Feng Hong, Minglu Li, Xinda Lu, Yi Wang, Jiadi Yu,...
GLVLSI
2009
IEEE
131views VLSI» more  GLVLSI 2009»
15 years 10 months ago
Octilinear redistributive routing in bump arrays
This paper proposes a scheme for automatic re-distribution layer (RDL) routing, which is used in chip-package connections. Traditional RDL routing designs are mostly performed man...
Renshen Wang, Chung-Kuan Cheng
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
MATA
2001
Springer
15 years 8 months ago
Multipoint-to-Point Routing with QoS Guarantees Using Mobile Agents
To overcome the shortcomings of existing IP networks and to facilitate the overall quality-of-service (QoS) provisioning in the near-future networks, new technologies such as Multi...
Sergio González-Valenzuela, Victor C. M. Le...
ESAS
2007
Springer
15 years 10 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...