Sciweavers

1498 search results - page 150 / 300
» Collection tree protocol
Sort
View
EUROSYS
2007
ACM
15 years 11 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
124
Voted
PE
2002
Springer
150views Optimization» more  PE 2002»
15 years 2 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
FC
2008
Springer
90views Cryptology» more  FC 2008»
15 years 4 months ago
Practical Anonymous Divisible E-Cash from Bounded Accumulators
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unl...
Man Ho Au, Willy Susilo, Yi Mu
ICDCS
2008
IEEE
15 years 9 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
118
Voted
VTC
2006
IEEE
15 years 8 months ago
SNMP-Based Approach to Load Distribution in IEEE 802.11 Networks
Abstract— In an IEEE 802.11 network, the traffic load collectively given by wireless stations (WSs) is usually not fairly shared by all available access points (APs), as WSs ind...
Li-Hsing Yen, Tse-Tsung Yeh