Sciweavers

432 search results - page 86 / 87
» Topology Control for Constant Rate Mobile Networks
Sort
View
EUROCRYPT
2007
Springer
13 years 11 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
OSN
2008
109views more  OSN 2008»
13 years 5 months ago
A non-competing hybrid optical burst switch architecture for QoS differentiation
In this paper, we present a new hybrid optical burst switch architecture (HOBS) that takes advantage of the pre-transmission idle time during lightpath establishment. In dynamic c...
Kyriakos Vlachos, Kostas Ramantas
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 3 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
13 years 10 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SASO
2009
IEEE
14 years 16 hour ago
Self-organized Fault-tolerant Routing in Peer-to-Peer Overlays
—In sufficiently large heterogeneous overlays message loss and delays are likely to occur. This has a significant impact on overlay routing, especially on longer paths. The exi...
Wojciech Galuba, Karl Aberer, Zoran Despotovic, Wo...