Sciweavers

1565 search results - page 254 / 313
» Optimizing Layered Communication Protocols
Sort
View
ICC
2007
IEEE
14 years 4 months ago
Inter-Domain QoS Routing with Virtual Trunks
— This paper addresses the problem of inter-domain QoS routing. We propose a solution based on virtual-trunk type aggregates corresponding to Service Level Agreements (SLA) for d...
Rui Prior, Susana Sargento
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 4 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
SIGCOMM
2010
ACM
13 years 10 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...
INFOCOM
2012
IEEE
12 years 11 days ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
TIT
2008
187views more  TIT 2008»
13 years 9 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer