A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Most languages used for developing web services and clients exhibit properties which make calling remote functions across a network a non-trivial task. The type systems used by ob...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
Many cooperated web cache systems and protocols have been proposed. But, these systems need the expensive resources, such as core-link bandwidth and proxy cpu or storage, and need...
We present a distributed protocol for maintaining a maximum flow spanning tree in a network, with a designated node as the root of the tree. This maximum flow spanning tree can be...
: We present a new distributed mechanism for tracking moving objects with a network of sensors. To track such objects efficiently and accurately, we need techniques that allow the ...
Maria Halkidi, Dimitris Papadopoulos, Vana Kaloger...