Sciweavers

3257 search results - page 534 / 652
» networking 2004
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 10 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ISCAPDCS
2004
15 years 6 months ago
A New Multicast Queuing Mechanism for High-Speed Packet Switches
Increasing multimedia applications such as teleconferencing and video-on-demand require the Internet to effectively provide high-performance multicast support. One of the promisin...
Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang
125
Voted
JASIS
2007
119views more  JASIS 2007»
15 years 4 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
ICIP
2004
IEEE
16 years 6 months ago
MDC and path diversity in video streaming
Delivering multimedia content over the network pose several challenges that include higher bandwidth and sensitivity to packet losses resulting due to congestion and/or transmissi...
Siva Somasundaram, Koduvayur P. Subbalakshmi, R. N...
WWW
2004
ACM
16 years 5 months ago
Session level techniques for improving web browsing performance on wireless links
Recent observations through experiments that we have performed in current third generation wireless networks have revealed that the achieved throughput over wireless links varies ...
Pablo Rodriguez, Sarit Mukherjee, Sampath Rangaraj...