Sciweavers

1718 search results - page 295 / 344
» Communicating more than nothing
Sort
View
CSCW
2006
ACM
13 years 9 months ago
Scientific Data Collections and Distributed Collective Practice
As the basic sciences become increasingly information-intensive, the management and use of research data presents new challenges in the collective activities that constitute schola...
Melissa H. Cragin, Kalpana Shankar
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
INFOCOM
2010
IEEE
13 years 7 months ago
Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System
—More fundamental than IP lookups and packet classification in routers is the extraction of fields such as IP Dest and TCP Ports that determine packet forwarding. While parsing...
Christos Kozanitis, John Huber, Sushil Singh, Geor...
PE
2010
Springer
102views Optimization» more  PE 2010»
13 years 7 months ago
Extracting state-based performance metrics using asynchronous iterative techniques
Solution of large sparse linear fixed-point problems lies at the heart of many important performance analysis calculations. These calculations include steady-state, transient and...
Douglas V. de Jager, Jeremy T. Bradley
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 7 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov