Sciweavers

3751 search results - page 645 / 751
» Events in security protocols
Sort
View
ICT
2004
Springer
120views Communications» more  ICT 2004»
15 years 3 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
NOSSDAV
2004
Springer
15 years 3 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
ICNP
2003
IEEE
15 years 3 months ago
Delay Analysis of IEEE 802.11 in Single-Hop Networks
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
DEBS
2003
ACM
15 years 3 months ago
Relational subscription middleware for Internet-scale publish-subscribe
We present a design of a distributed publish-subscribe system that extends the functionality of messaging middleware with “relational subscriptions”, to support timely updates...
Yuhui Jin, Robert E. Strom
WOSP
2000
ACM
15 years 2 months ago
Quantitative system evaluation with DSPNexpress 2000
This paper describes the software package DSPNexpress 2000, a tool for the quantitative evaluation of systems specified in stochastic Petri nets, the Unified Modeling Language (UM...
Christoph Lindemann, Axel Thümmler, Alexander...