Sciweavers

3972 search results - page 90 / 795
» Design of the iSCSI Protocol
Sort
View
PODC
2011
ACM
13 years 1 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi
EEE
2005
IEEE
14 years 3 months ago
A Pattern Language for Decentralized Coordination and Negotiation Protocols
Currently negotiation covers a huge and unstructured domain of negotiation- and coordination protocols and associated strategies. Researchers and practitioners like system enginee...
Adrian Paschke, Christine Kiss, Samer Al-Hunaty
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
14 years 4 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
SIGMETRICS
2002
ACM
117views Hardware» more  SIGMETRICS 2002»
13 years 9 months ago
Context-aware TCP/IP
Abstract-This paper discusses the design and evaluation of CATNIP, a ContextAware Transport/Network Internet Protocol for the Web. This integrated protocol uses application-layer k...
Carey L. Williamson, Qian Wu
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 8 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg