Sciweavers

206 search results - page 41 / 42
» Use of Chinese Short Messages
Sort
View
SIGCOMM
1999
ACM
13 years 11 months ago
Load-Sensitive Routing of Long-Lived IP Flows
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic pa...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
WG
1998
Springer
13 years 11 months ago
Graphs with Bounded Induced Distance
In this work we introduce the class of graphs with bounded induced distance of order k, (BID(k) for short). A graph G belongs to BID(k) if the distance between any two nodes in ev...
Serafino Cicerone, Gabriele Di Stefano
ICNP
1996
IEEE
13 years 11 months ago
On the relationship between file sizes, transport protocols, and self-similar network traffic
Recent measurements of local-area and wide-area traffic have shown that network traffic exhibits variability at a wide range of scales. In this paper, we examine a mechanism that ...
Kihong Park, Gitae Kim, Mark Crovella
ICDCS
2010
IEEE
13 years 11 months ago
A Hybrid Approach to High Availability in Stream Processing Systems
Abstract—Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail...
Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, ...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro