Sciweavers

SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
NOCS
2010
IEEE
13 years 1 months ago
Physical vs. Virtual Express Topologies with Low-Swing Links for Future Many-Core NoCs
The number of cores present on-chip is increasing rapidly. The on-chip network that connects these cores needs to scale efficiently. The topology of on-chip networks is an importan...
Chia-Hsin Owen Chen, Niket Agarwal, Tushar Krishna...
PC
2010
111views Management» more  PC 2010»
13 years 2 months ago
Reducing complexity in tree-like computer interconnection networks
The fat-tree is one of the topologies most widely used to build high-performance parallel computers. However, they are expensive and difficult to build. In this paper we propose t...
Javier Navaridas, José Miguel-Alonso, Franc...
ORDER
2002
87views more  ORDER 2002»
13 years 3 months ago
Posets on up to 16 Points
In this article we describe a very efficient method to construct pairwise nonisomorphic posets (equivalently, T0 topologies). We also give the results obtained by a computer progr...
Gunnar Brinkmann, Brendan D. McKay
AEI
1999
120views more  AEI 1999»
13 years 3 months ago
Genetic algorithms for designing multihop lightwave network topologies
Multihop lightwave networks are a means of utilizing the large bandwidth of optical fibers. In these networks, each node has a fixed number of transmitters and receivers connected...
Cenk Gazen, Cem Ersoy
CCR
2000
104views more  CCR 2000»
13 years 3 months ago
On the origin of power laws in Internet topologies
Recent empirical studies [6] have shown that Internet topologies exhibit power laws of the form
Alberto Medina, Ibrahim Matta, John W. Byers
JSAC
2007
116views more  JSAC 2007»
13 years 3 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
JSAC
2006
157views more  JSAC 2006»
13 years 3 months ago
Traffic grooming in path, star, and tree networks: complexity, bounds, and algorithms
We consider the problem of traffic grooming in WDM path, star, and tree networks. Traffic grooming is a variant of the well-known logical topology design, and is concerned with the...
Shu Huang, Rudra Dutta, George N. Rouskas
CCR
2006
82views more  CCR 2006»
13 years 3 months ago
The internet AS-level topology: three data sources and one definitive metric
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP,...
Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenk...
CN
2008
100views more  CN 2008»
13 years 3 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell