Sciweavers

537 search results - page 75 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
P2P
2009
IEEE
122views Communications» more  P2P 2009»
15 years 6 months ago
Virtual Direction Routing for Overlay Networks
The enormous interest for peer-to-peer systems in recent years has prompted research into finding scalable and robust seeding and searching methods to support these overlay netwo...
Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanarama...
NETWORKING
2008
15 years 1 months ago
Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes
In this paper the authors present a simulation study of two 802.11e network scenarios. The presented analysis is not only novel but most of all crucial for understanding how a theo...
Katarzyna Kosek, Marek Natkaniec, Luca Vollero
IJSNET
2007
115views more  IJSNET 2007»
14 years 11 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...
USENIX
2008
15 years 2 months ago
Measurement and Analysis of Large-Scale Network File System Workloads
In this paper we present the analysis of two large-scale network file system workloads. We measured CIFS traffic for two enterprise-class file servers deployed in the NetApp data ...
Andrew W. Leung, Shankar Pasupathy, Garth R. Goods...
EUROCRYPT
2005
Springer
15 years 5 months ago
On Robust Combiners for Oblivious Transfer and Other Primitives
A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes two candidate schemes for P and combines them into one scheme that securely implement P even i...
Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold...