Sciweavers

3972 search results - page 115 / 795
» Design of the iSCSI Protocol
Sort
View
CORR
2006
Springer
68views Education» more  CORR 2006»
13 years 10 months ago
Using shifted conjugacy in braid-based cryptography
Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat
Patrick Dehornoy
CONEXT
2010
ACM
13 years 8 months ago
Scalable routing on flat names
We introduce a protocol which routes on flat, locationindependent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of...
Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gia...
ANSS
2006
IEEE
14 years 4 months ago
Modeling and Optimization for the Design of IMS Networks
The IP Multimedia Subsystem (IMS) is envisioned as the solution for the next generation multimedia rich communication. Based on an open IP infrastructure, it enables convergence o...
Nisha Rajagopal, Michael Devetsikiotis
RTAS
1995
IEEE
14 years 1 months ago
Design and evaluation of a window-consistent replication service
—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time gu...
Ashish Mehra, Jennifer Rexford, Hock-Siong Ang, Fa...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 10 months ago
Design and Implementation VOIP Service on Open IMS and Asterisk Servers Interconnected through Enum Server
Asterisk and Open IMS use SIP signal protocol to enable both of them can be connected. To facilitate both relationships, Enum server- that is able to translate the numbering addre...
Rendy Munadi, Effan Najwaini, Asep Mulyana, R. Rum...