Sciweavers

4305 search results - page 223 / 861
» Analysing Protocol Implementations
Sort
View
COMCOM
2002
68views more  COMCOM 2002»
13 years 9 months ago
A performance study of RSVP with proposed extensions
Resource ReSerVation Protocol (RSVP) was developed as an intended key component for the evolving Internet, and in particular for the Integrated Services architecture. Therefore, R...
Laurent Mathy, David Hutchison, Stefan Schmid, Ste...
FOCS
2010
IEEE
13 years 7 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 3 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...
SOSP
2003
ACM
14 years 6 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
IPPS
2005
IEEE
14 years 2 months ago
Impact of Event Logger on Causal Message Logging Protocols for Fault Tolerant MPI
— Fault tolerance in MPI becomes a main issue in the HPC community. Several approaches are envisioned from user or programmer controlled fault tolerance to fully automatic fault ...
Aurelien Bouteiller, Boris Collin, Thomas Hé...