Sciweavers

4998 search results - page 865 / 1000
» The case for intentional networking
Sort
View
SISW
2003
IEEE
14 years 2 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
HT
2003
ACM
14 years 2 months ago
Browsing intricately interconnected paths
Graph-centric and node-centric browsing are the two commonly identified hypertext-browsing paradigms. We believe that pathcentric browsing, the browsing behavior exhibited by path...
Pratik Dave, Unmil Karadkar, Richard Furuta, Luis ...
PODC
2003
ACM
14 years 2 months ago
Scalable and dynamic quorum systems
We investigate issues related to the probe complexity of quorum systems and their implementation in a dynamic environment. Our contribution is twofold. The first regards the algo...
Moni Naor, Udi Wieder
SIGMETRICS
2003
ACM
14 years 2 months ago
Resilient multicast using overlays
We introduce PRM (Probabilistic Resilient Multicast): a multicast data recovery scheme that improves data delivery ratios while maintaining low end-to-end latencies. PRM has both ...
Suman Banerjee, Seungjoon Lee, Bobby Bhattacharjee...
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...