Sciweavers

95 search results - page 12 / 19
» A Traitor Tracing Scheme Based on the RSA System
Sort
View
WINET
2010
127views more  WINET 2010»
14 years 10 months ago
A Markov Decision Process based flow assignment framework for heterogeneous network access
We consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, we address the problem of effici...
Jatinder Pal Singh, Tansu Alpcan, Piyush Agrawal, ...
SIGCOMM
2012
ACM
13 years 2 months ago
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work,...
Yong Li, Depeng Jin, Pan Hui, Li Su, Lieguang Zeng
DAC
2007
ACM
16 years 19 days ago
Dynamic Power Management with Hybrid Power Sources
DPM (Dynamic Power Management) is an effective technique for reducing the energy consumption of embedded systems that is based on migrating to a low power state when possible. Whi...
Jianli Zhuo, Chaitali Chakrabarti, Kyungsoo Lee, N...
77
Voted
KBSE
2009
IEEE
15 years 6 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
97
Voted
WCW
2004
Springer
15 years 5 months ago
A Scalable Channel-Based Multi-source Content Distribution System
Aiming at improving file download speed, existing large-scale P2P content distribution systems substantially employ a multi-source parallel downloading scheme to allow peers servi...
Pei Zheng, Chen Wang Xeja