Sciweavers

625 search results - page 67 / 125
» Latency Insensitive Protocols
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
ICMCS
2007
IEEE
157views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Cooperative Peer-to-Peer Repair for Wireless Multimedia Broadcast
Abstract— This paper explores how to leverage IEEE802.11based cooperative peer-to-peer repair (CPR) to enhance the reliability of wireless multimedia broadcasting. We first form...
Saqib Raza, Danjue Li, Chen-Nee Chuah, Gene Cheung
APNOMS
2007
Springer
14 years 3 months ago
A Self-managing SIP-Based IP Telephony System Based on a P2P Approach Using Kademlia
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
PVM
2007
Springer
14 years 3 months ago
Using CMT in SCTP-Based MPI to Exploit Multiple Interfaces in Cluster Nodes
Many existing clusters use inexpensive Gigabit Ethernet and often have multiple interfaces cards to improve bandwidth and enhance fault tolerance. We investigate the use of Concurr...
Brad Penoff, Mike Tsai, Janardhan R. Iyengar, Alan...
DSN
2006
IEEE
14 years 3 months ago
High Throughput Total Order Broadcast for Cluster Environments
Total order broadcast is a fundamental communication primitive that plays a central role in bringing cheap software-based high availability to a wide array of services. This paper...
Rachid Guerraoui, Ron R. Levy, Bastian Pochon, Viv...