Sciweavers

986 search results - page 102 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
JSAC
2006
153views more  JSAC 2006»
13 years 9 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
14 years 9 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
ICPP
2006
IEEE
14 years 3 months ago
False Rate Analysis of Bloom Filter Replicas in Distributed Systems
Recently, Bloom filters have been widely used in distributed systems where they are replicated to process distributed queries. Bloom filter replicas become stale in a dynamic en...
Yifeng Zhu, Hong Jiang
ICICS
2005
Springer
14 years 2 months ago
Batching SSL/TLS Handshake Improved
Secure socket layer (SSL) is the most popular protocol to secure Internet communications. Since SSL handshake requires a large amount of computational resource, batch RSA was propo...
Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
IEICET
2007
76views more  IEICET 2007»
13 years 9 months ago
Performance Analysis of IEEE 802.11 DCF in a Multi-Rate WLAN
The IEEE 802.11 family of specifications is by far the most prominent and successful technique for accessing WLANs. Because the channel used by wireless devices is a time-varying...
Weikuo Chu, Yu-Chee Tseng