Sciweavers

483 search results - page 53 / 97
» Patterns of Protocols
Sort
View
APSEC
2005
IEEE
15 years 8 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
INFOCOM
2003
IEEE
15 years 7 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
NDSS
2009
IEEE
15 years 9 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
KIVS
1999
Springer
15 years 6 months ago
Cost and Price Calculation for Internet Integrated Services
Abstract Charging schemes are needed to protect an integrated services network from arbitrary resource reservations and to create a funding mechanism to extend network capacity at ...
Martin Karsten, Jens Schmitt, Lars C. Wolf, Ralf S...
SIGCOMM
2004
ACM
15 years 7 months ago
Link-level measurements from an 802.11b mesh network
This paper analyzes the causes of packet loss in a 38-node urban multi-hop 802.11b network. The patterns and causes of loss are important in the design of routing and errorcorrect...
Daniel Aguayo, John C. Bicket, Sanjit Biswas, Glen...