Sciweavers

3921 search results - page 683 / 785
» Transforming Models with ATL
Sort
View
SIGMETRICS
2000
ACM
14 years 2 months ago
TCP in presence of bursty losses
In this paper we analyze the performance of a TCP-like flow control in a lossy environment. The transmission rate in the control scheme that we consider has a linear growth rate;...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
MM
1999
ACM
112views Multimedia» more  MM 1999»
14 years 2 months ago
Geometrically correct imagery for teleconferencing
Current camera-monitor teleconferencing applications produce unrealistic imagery and break any sense of presence for the participants. Other capture/display technologies can be us...
Ruigang Yang, Michael S. Brown, W. Brent Seales, H...
ICDCS
1999
IEEE
14 years 2 months ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan
ICNP
1999
IEEE
14 years 2 months ago
Fluid Analysis of Delay Performance for QoS Support in Wireless Networks
Providing quality of service (QoS) guarantees over wireless links requires thorough understanding and quantification of the interactions among the traffic source, the wireless cha...
Jeong Geun Kim, Marwan Krunz