Sciweavers

2500 search results - page 138 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
ICPP
1998
IEEE
15 years 7 months ago
Efficient Multicast on Myrinet using Link-Level Flow Control
This paper studies the implementation of efficient multicast protocols for Myrinet, a switched, wormhole-routed, Gigabit-per-second network technology. Since Myrinet does not supp...
Raoul Bhoedjang, Tim Rühl, Henri E. Bal
134
Voted
RIVF
2003
15 years 4 months ago
MAF: Un Protocole de Multicast Fiable
— This paper describes the design and implementation of a novel reliable multicast protocol, totally reliable and scalable to large number of receivers. MAF relies on Active Netw...
Prométhée Spathis, Kim Loan Thai
ETFA
2006
IEEE
15 years 9 months ago
Integrating Inaccessibility Control and Timer Management in CANELy
The CAN Enhanced Layer (CANELy) is a CAN-based infrastructure capable of extremely reliable communication. This paper describes the mechanisms and the techniques used in CANELy to...
José Rufino, Paulo Veríssimo, Carlos...
125
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 9 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
ICPADS
2005
IEEE
15 years 9 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci