Sciweavers

116 search results - page 13 / 24
» An End Host Multicast Protocol for Peer-to-Peer Networks
Sort
View
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 7 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
WCW
2004
Springer
14 years 1 months ago
FatNemo: Building a Resilient Multi-source Multicast Fat-Tree
This paper proposes the idea of emulating fat-trees in overlays for multi-source multicast applications. Fat-trees are like real trees in that their branches become thicker the clo...
Stefan Birrer, Dong Lu, Fabián E. Bustamant...
SIGMETRICS
2003
ACM
14 years 27 days ago
Resilient multicast using overlays
We introduce PRM (Probabilistic Resilient Multicast): a multicast data recovery scheme that improves data delivery ratios while maintaining low end-to-end latencies. PRM has both ...
Suman Banerjee, Seungjoon Lee, Bobby Bhattacharjee...
SAC
2009
ACM
14 years 2 months ago
Using geo-spatial session tagging for smart multicast session discovery
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP u...
Piyush Harsh, Richard Newman
INFOCOM
2003
IEEE
14 years 28 days ago
Analysis of Routing Characteristics in the Multicast Infrastructure
Abstract— As the multicast-capable part of the Internet continues to evolve, important questions to ask are whether the protocols are operating correctly, the topology is well co...
Prashant Rajvaidya, Kevin C. Almeroth