Sciweavers

1692 search results - page 326 / 339
» Quality of service support in IEEE 802.16 networks
Sort
View
NDSS
2007
IEEE
14 years 3 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
ICDCS
2005
IEEE
14 years 2 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
14 years 3 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
IPPS
2008
IEEE
14 years 3 months ago
Scalable data dissemination using hybrid methods
Web server scalability can be greatly enhanced via hybrid data dissemination methods that use both unicast and multicast. Hybrid data dissemination is particularly promising due t...
Wenhui Zhang, Vincenzo Liberatore, Jonathan Beaver...
GLOBECOM
2007
IEEE
14 years 3 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe