Sciweavers

403 search results - page 43 / 81
» Bits through ARQs
Sort
View
JNW
2007
86views more  JNW 2007»
13 years 8 months ago
Reliable Actuation in Sensor Networks
Abstract—We present a protocol that uses a publish/subscribe approach to perform reliable but efficient actuation over a sensor network whose topology may change. Actuation on a...
Sean Rooney, Luis Garcés-Erice
IMC
2009
ACM
14 years 3 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
14 years 2 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...
LCTRTS
2004
Springer
14 years 1 months ago
Asynchronous software thread integration for efficient software
Existing software thread integration (STI) methods provide synchronous thread progress within integrated functions. For the remaining, non-integrated portions of the secondary (or...
Nagendra J. Kumar, Siddhartha Shivshankar, Alexand...
SIGCOMM
2010
ACM
13 years 8 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...