Sciweavers

688 search results - page 116 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
ICUMT
2009
15 years 6 days ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
120
Voted
ICC
2008
IEEE
168views Communications» more  ICC 2008»
15 years 9 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
GCC
2004
Springer
15 years 7 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
136
Voted
IPTPS
2005
Springer
15 years 8 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
153
Voted
TELETRAFFIC
2007
Springer
15 years 8 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan