Sciweavers

785 search results - page 149 / 157
» Cache Behavior of Network Protocols
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
WISA
2004
Springer
14 years 24 days ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
IAT
2005
IEEE
14 years 1 months ago
Real-time Cooperative Multi-target Tracking by Dense Communication among Active Vision Agents
We have proposed a real-time multi-target tracking system by cooperative behaviors of Active Vision Agents (AVAs), where an AVA is a logical model of a networkconnected computer w...
Norimichi Ukita
INFOCOM
2005
IEEE
14 years 1 months ago
Achieving faster access to satellite link bandwidth
TCP with Van Jacobson congestion control (VJCC) is known to have poor performance over large bandwidthdelay product paths. Long delay paths, in particular, can display very poor b...
A. Kapoor, Aaron Falk, Theodore Faber, Y. Pryadkin
INFOCOM
2005
IEEE
14 years 1 months ago
TCP-Africa: an adaptive and fair rapid increase rule for scalable TCP
— High capacity data transfers over the Internet routinely fail to meet end-to-end performance expectations. The default transport control protocol for best effort data traffic ...
R. King, Richard G. Baraniuk, Rudolf H. Riedi