Sciweavers

1565 search results - page 254 / 313
» Optimizing Layered Communication Protocols
Sort
View
125
Voted
ICC
2007
IEEE
15 years 9 months ago
Inter-Domain QoS Routing with Virtual Trunks
— This paper addresses the problem of inter-domain QoS routing. We propose a solution based on virtual-trunk type aggregates corresponding to Service Level Agreements (SLA) for d...
Rui Prior, Susana Sargento
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 9 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
133
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...
134
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
TIT
2008
187views more  TIT 2008»
15 years 2 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer