Sciweavers

16128 search results - page 2818 / 3226
» Distributed network scheduling
Sort
View
ARCS
2004
Springer
15 years 10 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
118
Voted
GCC
2004
Springer
15 years 10 months ago
End Host Multicast for Peer-to-Peer Systems
Abstract. Multicast is an effective means for conducting the cooperative P2P communications. This paper studies an algorithm to construct a scalable and efficient end host multica...
Wanqing Tu, Weijia Jia
118
Voted
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
15 years 10 months ago
Two-Tier Geographic Location of Internet Hosts
Multimedia delivery systems, such as Content Distribution Networks (CDNs), improve by knowing the geographic location of their clients. Therefore, we focus on a measurement-based g...
Bamba Gueye, Artur Ziviani, Serge Fdida, Jos&eacut...
138
Voted
ICT
2004
Springer
120views Communications» more  ICT 2004»
15 years 10 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
122
Voted
IH
2004
Springer
15 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
« Prev « First page 2818 / 3226 Last » Next »