Sciweavers

4312 search results - page 767 / 863
» Semi-User-Level Communication Architecture
Sort
View
109
Voted
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Quantifying trade-offs in resource allocation for VPNs
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
152
Voted
SLIP
2004
ACM
15 years 9 months ago
Optical solutions for system-level interconnect
Throughput, power consumption, signal integrity, pin count and routing complexity are all increasingly important interconnect issues that the system designer must deal with. Recen...
Ian O'Connor
WS
2004
ACM
15 years 9 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
BIOADIT
2004
Springer
15 years 9 months ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
15 years 9 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...