Sciweavers

1498 search results - page 129 / 300
» Collection tree protocol
Sort
View
126
Voted
ESORICS
2007
Springer
15 years 11 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
119
Voted
IPPS
1997
IEEE
15 years 9 months ago
Lower Bounds on Systolic Gossip
Gossiping is an information dissemination process in which each processor has a distinct item of information and has to collect all the items possessed by the other processors. In...
Michele Flammini, Stephane Perennes
159
Voted
SMI
2010
IEEE
218views Image Analysis» more  SMI 2010»
15 years 3 months ago
A Benchmark for 3D Mesh Watermarking
This paper presents a benchmarking system for the evaluation of robust mesh watermarking methods. The proposed benchmark has three different components: a "standard" mesh...
Kai Wang, Guillaume Lavoué, Florence Denis,...
ICDCS
2009
IEEE
16 years 2 months ago
REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems
To observe, analyze and control large scale distributed systems and the applications hosted on them, there is an increasing need to continuously monitor performance attributes of ...
Shicong Meng, Srinivas R. Kashyap, Chitra Venkatra...
135
Voted
BMCBI
2006
92views more  BMCBI 2006»
15 years 5 months ago
Recrafting the neighbor-joining method
Background: The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical (n3)...
Thomas Mailund, Gerth Stølting Brodal, Rolf...