Sciweavers

3972 search results - page 162 / 795
» Design of the iSCSI Protocol
Sort
View
ICDCS
2003
IEEE
15 years 9 months ago
Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network
In a system proposed by Plaxton, Rajaraman and Richa (PRR), the expected cost of accessing a replicated object was proved to be asymptotically optimal for a static set of nodes an...
Huaiyu Liu, Simon S. Lam
JCP
2006
120views more  JCP 2006»
15 years 4 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
MOBICOM
2009
ACM
15 years 10 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
MOBILITY
2009
ACM
15 years 10 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat
LCN
2007
IEEE
15 years 10 months ago
Modified Algorithms for Multilevel GRSB Protocol
— GRSB - Guaranteed, Reliable, Secure Broadcast - is a protocol that provides reliable and secure broadcast / multicast communications [1,2]. It can be implemented in many types ...
Mohammad Asadul Hoque, S. M. Iftekharul Amin, Md. ...