Sciweavers

5882 search results - page 1118 / 1177
» networks 2010
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 9 months ago
The WebContent XML Store
In this article, we describe the XML storage system used in the WebContent project. We begin by advocating the use of an XML database in order to store WebContent documents, and w...
Benjamin Nguyen, Spyros Zoupanos
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 9 months ago
A New Phase Transition for Local Delays in MANETs
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
François Baccelli, Bartek Blaszczyszyn
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
DC
2010
13 years 9 months ago
A knowledge-based analysis of global function computation
Consider a distributed system N in which each agent has an input value and each communication link has a weight. Given a global function, that is, a function f whose value depends...
Joseph Y. Halpern, Sabina Petride
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 8 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
« Prev « First page 1118 / 1177 Last » Next »