Sciweavers

296 search results - page 30 / 60
» A synchronization and compensation protocol for multimedia c...
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ICNP
1999
IEEE
13 years 12 months ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 2 months ago
Downlink TCP Performance Under Cross Layer Rate and Power Allocation in Infrastructure TH-PPM UWB Networks
Ultra wideband (UWB) systems are currently an important wireless infrastructure for efficient shortrange communications. To improve the system efficiency while guaranteeing the ra...
Yang Liu, Yu-Kwong Kwok, Jiangzhou Wang
ISPASS
2007
IEEE
14 years 2 months ago
Simplifying Active Memory Clusters by Leveraging Directory Protocol Threads
Address re-mapping techniques in so-called active memory systems have been shown to dramatically increase the performance of applications with poor cache and/or communication beha...
Dhiraj D. Kalamkar, Mainak Chaudhuri, Mark Heinric...