Sciweavers

198 search results - page 11 / 40
» A practical algorithm for constructing oblivious routing sch...
Sort
View
EUC
2004
Springer
15 years 5 months ago
VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity
High heterogeneity is an unignoring factor for large-scale peer-to-peer system which leads to the born of VChord. VChord is a peer-to-peer overlay network constructed on Chord aime...
Feng Hong, Minglu Li, Xinda Lu, Yi Wang, Jiadi Yu,...
80
Voted
GLVLSI
2009
IEEE
131views VLSI» more  GLVLSI 2009»
15 years 6 months ago
Octilinear redistributive routing in bump arrays
This paper proposes a scheme for automatic re-distribution layer (RDL) routing, which is used in chip-package connections. Traditional RDL routing designs are mostly performed man...
Renshen Wang, Chung-Kuan Cheng
98
Voted
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
MATA
2001
Springer
15 years 4 months ago
Multipoint-to-Point Routing with QoS Guarantees Using Mobile Agents
To overcome the shortcomings of existing IP networks and to facilitate the overall quality-of-service (QoS) provisioning in the near-future networks, new technologies such as Multi...
Sergio González-Valenzuela, Victor C. M. Le...
ESAS
2007
Springer
15 years 5 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...