Sciweavers

448 search results - page 74 / 90
» k-anonymous message transmission
Sort
View
CCN
2006
137views Communications» more  CCN 2006»
13 years 8 months ago
Impact of sack delay and link delay on failover performance in SCTP
The Stream Control Transmission Protocol (SCTP) was developed to support the transfer of telephony signaling over IP networks. One of the ambitions when designing SCTP was to offe...
Johan Eklund, Anna Brunstrom
CSREAESA
2006
13 years 8 months ago
FEMPI: A Lightweight Fault-tolerant MPI for Embedded Cluster Systems
- Ever-increasing demands of space missions for data returns from their limited processing and communications resources have made the traditional approach of data gathering, data c...
Rajagopal Subramaniyan, Vikas Aggarwal, Adam Jacob...
MASCOTS
2003
13 years 8 months ago
NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services
Web Services are an emerging software technology that employ XML to share and exchange data. They may serve as wrappers for legacy data sources, integrate multiple remote data sou...
Shahram Ghandeharizadeh, Christos Papadopoulos, Pa...
CASCON
1996
99views Education» more  CASCON 1996»
13 years 8 months ago
Modeling and analysis of the Unix communication subsystems
The performance of host communication subsystems is an important research topic in computer networks.1 Performance metrics such as throughput, delay, and packet loss are important...
Yi-Chun Chu, Toby J. Teorey
WISEC
2010
ACM
13 years 7 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...