Sciweavers

972 search results - page 99 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
NSDI
2004
13 years 11 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
CCS
2009
ACM
14 years 5 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ACMACE
2006
ACM
14 years 4 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
WONS
2005
IEEE
14 years 3 months ago
Co-operative Downloading in Vehicular Ad-Hoc Wireless Networks
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...
EUROMICRO
2005
IEEE
14 years 3 months ago
RSerPool - Providing Highly Available Services using Unreliable Servers
The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by mechanisms an...
Thomas Dreibholz, Erwin P. Rathgeb