Sciweavers

SIGCOMM
1995
ACM
15 years 4 months ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
121
Voted
SIGCOMM
1995
ACM
15 years 4 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
118
Voted
SIGCOMM
1995
ACM
15 years 4 months ago
Software Support for Outboard Buffering and Checksumming
Data copying and checksumming are the most expensive operations when doing high-bandwidth network IO over a highspeed network. Under some conditions, outboard buffering and checks...
Karl Kleinpaste, Peter Steenkiste, Brian Zill
SIGCOMM
1995
ACM
15 years 4 months ago
Log-Based Receiver-Reliable Multicast for Distributed Interactive Simulation
Reliable multicast communication is important in large-scale distributed applications. For example, reliable multicast is used to transmit terrain and environmental updates in dis...
Hugh W. Holbrook, Sandeep K. Singhal, David R. Che...
112
Voted
SIGCOMM
1995
ACM
15 years 4 months ago
A Mobile User Location Update and Paging Mechanism Under Delay Constraints
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satis es prede ned delay requiremen...
Ian F. Akyildiz, Joseph S. M. Ho
Communications
Top of PageReset Settings