Sciweavers

1777 search results - page 280 / 356
» Programming Cryptographic Protocols
Sort
View
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
14 years 2 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
MOBICOM
2006
ACM
14 years 2 months ago
The design, deployment, and analysis of signetLab: a sensor network testbed and interactive management tool
Abstract-The emergence of small, inexpensive, networkcapable sensing devices led to a great deal of research on the design and implementation of sensor networks. A critical step in...
Riccardo Crepaldi, Simone Friso, Albert F. Harris ...
CNSR
2005
IEEE
14 years 2 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu
ICMCS
2005
IEEE
136views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Gridmedia: A Multi-Sender Based Peer-to-Peer Multicast System for Video Streaming
We present a novel single source peer-to-peer multicast architecture called GridMedia which mainly consists of 1) multi-sender based overlay multicast protocol (MSOMP) and 2) mult...
Meng Zhang, Yun Tang, Li Zhao, Jian-Guang Luo, Shi...
IPPS
2005
IEEE
14 years 2 months ago
Connection-less TCP
TCP is an important protocol in high-performance computing. It is used extensively in graphics programs and file systems and it is often the protocol used for the cluster control...
Patricia Gilfeather, Arthur B. Maccabe