Sciweavers

4305 search results - page 283 / 861
» Analysing Protocol Implementations
Sort
View
124
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoide...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
148
Voted
ICPP
1999
IEEE
15 years 6 months ago
Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory
The probability of failures in software distributed shared memory (SDSM) increases as the system size grows. This paper introduces a new, efficient message logging technique, call...
Angkul Kongmunvattana, Nian-Feng Tzeng
CCS
2010
ACM
15 years 2 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
119
Voted
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 2 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
123
Voted
WINET
2002
124views more  WINET 2002»
15 years 2 months ago
Improving Energy Efficiency of Centrally Controlled Wireless Data Networks
Wireless network access protocols can assist nodes to conserve energy by identifying when they can enter low energy states. The goal is to put all nodes not involved in a transmiss...
John A. Stine, Gustavo de Veciana