Sciweavers

1859 search results - page 282 / 372
» Sketch-based path design
Sort
View
124
Voted
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
EUROPKI
2007
Springer
15 years 9 months ago
AutoPKI: A PKI Resources Discovery System
The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a P...
Massimiliano Pala, Sean W. Smith
134
Voted
ICOIN
2007
Springer
15 years 9 months ago
Balanced Multipath Source Routing
Abstract. We consider the problem of balancing the traffic load ideally over a wireless multihop network. In previous work, a systematic approach to this task was undertaken, start...
Shreyas Prasad, André Schumacher, Harri Haa...
136
Voted
PAM
2007
Springer
15 years 9 months ago
Neuro-fuzzy Processing of Packet Dispersion Traces for Highly Variable Cross-Traffic Estimation
Cross-traffic data rate over the tight link of a path can be estimated using different active probing packet dispersion techniques. Many of these techniques send large amounts of p...
Marco A. Alzate, Néstor M. Peña, Mig...
130
Voted
TELETRAFFIC
2007
Springer
15 years 9 months ago
Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. In a wavelength-routed optical network...
Alicia Nicki Washington, Harry G. Perros