Sciweavers

1777 search results - page 326 / 356
» Programming Cryptographic Protocols
Sort
View
JSAC
2006
143views more  JSAC 2006»
13 years 8 months ago
Capacity and QoS for a Scalable Ring-Based Wireless Mesh Network
The wireless mesh network (WMN) is an economical solution to support ubiquitous broadband services. This paper investigates the tradeoffs among quality-of-service (QoS), capacity, ...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
MAGS
2007
82views more  MAGS 2007»
13 years 8 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...
CCR
2004
151views more  CCR 2004»
13 years 8 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
AAMAS
2000
Springer
13 years 8 months ago
Rational Coordination in Multi-Agent Environments
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents, and present a framework that uses this paradigm t...
Piotr J. Gmytrasiewicz, Edmund H. Durfee
CONCURRENCY
2000
83views more  CONCURRENCY 2000»
13 years 8 months ago
Javia: A Java interface to the virtual interface architecture
The Virtual Interface (VI) architecture has become the industry standard for user-level network interfaces. This paper presents the implementation and evaluation of Javia, a Java ...
Chi-Chao Chang, Thorsten von Eicken