Sciweavers

1498 search results - page 90 / 300
» Collection tree protocol
Sort
View
ACSAC
2009
IEEE
15 years 9 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 9 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
PROMS
2001
Springer
170views Multimedia» more  PROMS 2001»
15 years 7 months ago
GCAP: A New Multimedia Multicast Architecture for QoS
Despite its obvious suitability for distributed multimedia applications, multicasting has not yet found widespread application. Having analyzed shortcomings of today's approac...
Michel Diaz, Roberto Canonico, Luis Costa, Serge F...
138
Voted
IANDC
2011
129views more  IANDC 2011»
14 years 9 months ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher
121
Voted
ICDCS
2003
IEEE
15 years 7 months ago
Experiences With Monitoring OSPF on a Regional Service Provider Network
This paper presents the results from a detailed, experimental study of OSPF, an intra-domain routing protocol, running on a mid-size regional Internet service provider. Using mult...
David Watson, Farnam Jahanian, Craig Labovitz