Sciweavers

537 search results - page 38 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
MOBIHOC
2009
ACM
15 years 10 months ago
MotionCast: on the capacity and delay tradeoffs
In this paper, we define multicast for ad hoc network through nodes' mobility as MotionCast, and study the capacity and delay tradeoffs for it. Assuming nodes move according ...
Chenhui Hu, Xinbing Wang, Feng Wu
OSDI
1994
ACM
14 years 11 months ago
Performance Issues in Parallelized Network Protocols
Parallel processing has been proposed as a means of improving network protocol throughput. Several different strategies have been taken towards parallelizing protocols. A relative...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
DC
2002
14 years 9 months ago
Causality tracking in causal message-logging protocols
Abstract. Casual message-logging protocols have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and never...
Lorenzo Alvisi, Karan Bhatia, Keith Marzullo
TCOS
2010
14 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
ARTMED
2006
158views more  ARTMED 2006»
14 years 10 months ago
CareVis: Integrated visualization of computerized protocols and temporal patient data
Objective: Currently, visualization support for patient data analysis is mostly limited to the representation of directly measured data. Contextual information on performed treatm...
Wolfgang Aigner, Silvia Miksch