Sciweavers

54 search results - page 7 / 11
» Multicast Snooping: A New Coherence Method Using a Multicast...
Sort
View
FORTE
2000
13 years 9 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
WD
2010
13 years 6 months ago
Enhancing FEC application in LTE cellular networks
3rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and M...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 2 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
ISCC
2005
IEEE
14 years 2 months ago
Optimizing the Reliable Distribution of Large Files within CDNs
Abstract Content Delivery Networks (CDNs) provide an efficient support for serving http and streaming media content while minimizing the network impact of content delivery as well...
Ludmila Cherkasova
CN
2007
77views more  CN 2007»
13 years 8 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...