Sciweavers

598 search results - page 111 / 120
» A fair certification protocol
Sort
View
134
Voted
PE
2002
Springer
137views Optimization» more  PE 2002»
15 years 4 months ago
Analysis of two competing TCP/IP connections
Many mathematical models exist for describing the behavior of TCP/IP (TCP: transmission control protocol) under an exogenous loss process that does not depend on the window size. ...
Eitan Altman, Tania Jiménez, R. Nú&n...
168
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Cooperative Resource Management in Cognitive WiMAX with Femto Cells
Abstract—WiMAX with femto cells is a cost-effective nextgeneration broadband wireless communication system. Cognitive Radio (CR) has recently emerged as a promising technology to...
Jin Jin, Baochun Li
148
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks
How to reduce the handoff delay and how to make appropriate handoff decisions are two fundamental challenges in designing an effective handoff scheme for 802.11 networks to provide...
Xi Chen, Daji Qiao
193
Voted
IEEEIAS
2009
IEEE
15 years 2 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
155
Voted
HOTNETS
2010
14 years 12 months ago
Data center networking with multipath TCP
Recently new data center topologies have been proposed that offer higher aggregate bandwidth and location independence by creating multiple paths in the core of the network. To ef...
Costin Raiciu, Christopher Pluntke, Sébasti...