Sciweavers

24 search results - page 3 / 5
» A New Protocol for Conditional Disclosure of Secrets and Its...
Sort
View
SIGCOMM
2003
ACM
13 years 11 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
PDP
1997
IEEE
13 years 10 months ago
The controlled logical clock--a global time for trace-based software monitoring of parallel applications in workstation clusters
Event tracing and monitoring of parallel applications are difficult if each processor has its own unsynchronized clock. A survey is given on several strategies to generate a glob...
Rolf Rabenseifner
INFOCOM
2000
IEEE
13 years 10 months ago
A QoS-Aware Multicast Routing Protocol
—The future Internet is expected to support multicast applications with quality of service (QoS) requirements. To facilitate this, QoS multicast routing protocols are pivotal in ...
Shigang Chen, Klara Nahrstedt, Yuval Shavitt
IPPS
2007
IEEE
14 years 3 days ago
Java and asynchronous iterative applications: large scale experiments
This paper focuses on large scale experiments with Java and asynchronous iterative applications. In those applications, tasks are dependent and the use of distant clusters may be ...
Jacques M. Bahi, Raphaël Couturier, David Lai...
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 8 days ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis