Sciweavers

117 search results - page 8 / 24
» Don't optimize existing protocols, design optimizable protoc...
Sort
View
CCS
2006
ACM
14 years 3 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
GLOBECOM
2006
IEEE
14 years 2 months ago
End-to-end Congestion Management for Real-Time Streaming Video over the Internet
– In this paper, we propose a new transport protocol, namely Scalable Streaming Video Protocol (SSVP), which employs an AIMD-oriented congestion control mechanism. SSVP, in a com...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
AIPS
2009
13 years 9 months ago
An Optimal Temporally Expressive Planner: Initial Results and Application to P2P Network Optimization
Temporally expressive planning, an important class of temporal planning, has attracted much attention lately. Temporally expressive planning is difficult; few existing planners ca...
Ruoyun Huang, Yixin Chen, Weixiong Zhang
CCS
2010
ACM
13 years 8 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
TWC
2008
245views more  TWC 2008»
13 years 8 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye