Sciweavers

658 search results - page 77 / 132
» Lower bounds for sorting networks
Sort
View
ICNP
2006
IEEE
14 years 1 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
IWQOS
2005
Springer
14 years 1 months ago
Designing a Predictable Internet Backbone with Valiant Load-Balancing
Abstract. Network operators would like their network to support current and future traffic matrices, even when links and routers fail. Not surprisingly, no backbone network can do ...
Rui Zhang-Shen, Nick McKeown
WCNC
2008
IEEE
14 years 2 months ago
Estimation of Interference-Free Transmit Power for Opportunistic Spectrum Access
Abstract— We consider a scenario in which frequency agile radios opportunistically share a fixed spectrum resource with a set of primary nodes. We develop a collaborative scheme...
Brian L. Mark, Ahmed O. Nasif
CDC
2009
IEEE
125views Control Systems» more  CDC 2009»
13 years 11 months ago
Mean square stabilization of multi-input systems over stochastic multiplicative channels
Abstract-- This paper deals with the mean square stabilization problem for multi-input networked systems via single packet or multiple packets transmission, where the unreliability...
Nan Xiao, Lihua Xie, Li Qiu
PODC
2003
ACM
14 years 1 months ago
Asynchronous resource discovery
Consider a dynamic, large-scale communication infrastructure (e.g., the Internet) where nodes (e.g., in a peer to peer system) can communicate only with nodes whose id (e.g., IP a...
Ittai Abraham, Danny Dolev