Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
INFOCOM
1999
IEEE
11 years 2 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
INFOCOM
1999
IEEE
11 years 2 months ago
An Effective and Efficient Traffic Smoothing Scheme for Delivery of Online VBR Media Streams
Traffic smoothing for delivery of online VBR media streams is one of the most important problems in designing multimedia systems. Given available client buffer and a window-slidin...
Ray-I Chang, Meng Chang Chen, Jan-Ming Ho, Ming-Ta...
INFOCOM
1999
IEEE
11 years 2 months ago
Cache-Based Compaction: A New Technique for Optimizing Web Transfer
In this paper, we propose and study a new technique, which we call cache-based compaction for reducing the latency of Web browsing over a slow link. Our compaction technique trades...
Mun Choon Chan, Thomas Y. C. Woo
INFOCOM
1999
IEEE
11 years 2 months ago
Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation
Abstract--We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Li...
Ramón Cáceres, Nick G. Duffield, Jos...
INFOCOM
1999
IEEE
11 years 2 months ago
Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...
John W. Byers, Michael Luby, Michael Mitzenmacher
INFOCOM
1999
IEEE
11 years 2 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
INFOCOM
1999
IEEE
11 years 2 months ago
Web Caching and Zipf-like Distributions: Evidence and Implications
Lee Breslau, Pei Cao, Li Fan, Graham Phillips, Sco...
INFOCOM
1999
IEEE
11 years 2 months ago
Adaptive FEC-Based Error Control for Internet Telephony
Jean-Chrysostome Bolot, Sacha Fosse-Parisis, Donal...
INFOCOM
1999
IEEE
11 years 2 months ago
A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks
We present, prove correctness for, and evaluate a protocol for the reliable broadcast of topology and link-state information in a multihop communication network with a dynamic topo...
Bhargav R. Bellur, Richard G. Ogier
INFOCOM
1999
IEEE
11 years 2 months ago
Ring versus Tree Embedding for Real-time Group Multicast
In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O...
Mario Baldi, Yoram Ofek
books