Sciweavers

1014 search results - page 160 / 203
» Distributed Algorithms for Attack Localization in All-Optica...
Sort
View
WS
2005
ACM
14 years 2 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ICDCS
2008
IEEE
14 years 3 months ago
MC2: Multiple Clients on a Multilevel Cache
In today’s networked storage environment, it is common to have a hierarchy of caches where the lower levels of the hierarchy are accessed by multiple clients. This sharing can h...
Gala Yadgar, Michael Factor, Kai Li, Assaf Schuste...
KIVS
2001
Springer
14 years 1 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
ASPLOS
2006
ACM
14 years 3 months ago
A spatial path scheduling algorithm for EDGE architectures
Growing on-chip wire delays are motivating architectural features that expose on-chip communication to the compiler. EDGE architectures are one example of communication-exposed mi...
Katherine E. Coons, Xia Chen, Doug Burger, Kathryn...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 8 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...