Sciweavers

86 search results - page 6 / 18
» The counting pyramid: an adaptive distributed counting schem...
Sort
View
DCC
2010
IEEE
13 years 7 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
MOBICOM
2006
ACM
14 years 1 months ago
A replica distrubution scheme for location-dependent information on vehicular ad hoc networks
In this paper we propose Road-aware Skip Copy (RSC) method for distributing replicas of location-dependent data on server-less vehicular ad hoc networks in urban areas. In the RSC...
M. Yamanaka, G. Tsuchida, S. Ishihara
IPPS
2007
IEEE
14 years 1 months ago
Speculative Flow Control for High-Radix Datacenter Interconnect Routers
High-radix switches are desirable building blocks for large computer interconnection networks, because they are more suitable to convert chip I/O bandwidth into low latency and lo...
Cyriel Minkenberg, Mitchell Gusat
NOMS
2008
IEEE
14 years 1 months ago
On the multi-scale behavior of packet size distribution in Internet backbone network
—It is critical to adapt clear and representative real world traffic properties as groundwork for the contemporary and emergent future Internet workload generation. Byte count p...
Seongjin Lee, Youjip Won, Dong-Joon Shin
DSN
2004
IEEE
13 years 11 months ago
Robust Aggregation Protocols for Large-Scale Overlay Networks
Aggregation refers to a set of functions that provide global information about a distributed system. These functions operate on numeric values distributed over the system and can ...
Alberto Montresor, Márk Jelasity, Özal...