Sciweavers

1807 search results - page 318 / 362
» Resilient Overlay Networks
Sort
View
CCS
2009
ACM
14 years 3 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
PIMRC
2008
IEEE
14 years 3 months ago
A Distributed IP Mobility Approach for 3G SAE
—Future generations of mobile operator networks, based on an all-IP-based flat architecture and a multitude of different access technologies, require a proper IP-based mobility ...
Mathias Fischer, Frank-Uwe Andersen, Andreas K&oum...
VTC
2008
IEEE
120views Communications» more  VTC 2008»
14 years 3 months ago
Boosting Video Capacity of IEEE 802.11n through Multiple Receiver Frame Aggregation
—The technology based on the IEEE 802.11 standard has been hugely successful, and is evolving towards even higher speeds and richer features. In particular, the 802.11n amendment...
Kyungsoo Lee, Sangki Yun, Hyogon Kim
ICDCS
2007
IEEE
14 years 3 months ago
Distributed Slicing in Dynamic Systems
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with...
Antonio Fernández, Vincent Gramoli, Ernesto...
ICDCS
2007
IEEE
14 years 3 months ago
A High Throughput Atomic Storage Algorithm
This paper presents an algorithm to ensure the atomicity of a distributed storage that can be read and written by any number of clients. In failure-free and synchronous situations...
Rachid Guerraoui, Dejan Kostic, Ron R. Levy, Vivie...