Sciweavers

828 search results - page 80 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
INFOCOM
2003
IEEE
15 years 8 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
IPPS
1997
IEEE
15 years 6 months ago
Designing Efficient Distributed Algorithms Using Sampling Techniques
In this paper we show the power of sampling techniques in designing efficient distributed algorithms. In particular, we show that using sampling techniques, on some networks, sele...
Sanguthevar Rajasekaran, David S. L. Wei
TRIDENTCOM
2010
IEEE
15 years 1 months ago
Multi-hop Wireless Network Emulation on StarBED
Abstract. In this paper, we present an architecture to emulate multihop wireless networks on StarBED, a wired-network testbed at Hokuriku Research Center of NICT, Japan. The archit...
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda
MIDDLEWARE
2010
Springer
15 years 1 months ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky
CODES
2005
IEEE
15 years 8 months ago
Spatial division multiplexing: a novel approach for guaranteed throughput on NoCs
To ensure low power consumption while maintaining flexibility and performance, future Systems-on-Chip (SoC) will combine several types of processor cores and data memory units of...
Anthony Leroy, Paul Marchal, Adelina Shickova, Fra...