Sciweavers

1777 search results - page 258 / 356
» Programming Cryptographic Protocols
Sort
View
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
14 years 3 months ago
BOPPER: Wireless Video Broadcasting with Peer-to-Peer Error Recovery
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...
Shenjie Li, S.-H. Gary Chan
IFIP
2005
Springer
14 years 2 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
SC
2004
ACM
14 years 2 months ago
RPC-V: Toward Fault-Tolerant RPC for Internet Connected Desktop Grids with Volatile Nodes
RPC is one of the programming models envisioned for the Grid. In Internet connected Large Scale Grids such as Desktop Grids, nodes and networks failures are not rare events. This ...
Samir Djilali, Thomas Hérault, Oleg Lodygen...
LCN
2002
IEEE
14 years 1 months ago
A Caching Strategy to Improve iSCSI Performance
iSCSI is one of the most recent standards that allows SCSI protocols to be carried out over IP networks. However, to encapsulate SCSI protocol over IP requires significant amount...
Xubin He, Qing Yang, Ming Zhang
VRML
2000
ACM
14 years 1 months ago
MVIP - audio enabled multicast VNet
This paper presents a multicast approach to shared virtual worlds. A shared VRML world is described with integrated spatial audio in a freeware VRML browser. An implementation in ...
John L. Robinson, John A. Stewart, Isabelle Labb&e...