Sciweavers

3483 search results - page 676 / 697
» Forward
Sort
View
CN
2004
122views more  CN 2004»
14 years 9 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
76
Voted
COMCOM
2004
138views more  COMCOM 2004»
14 years 9 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
CCR
2002
102views more  CCR 2002»
14 years 9 months ago
DNS performance and the effectiveness of caching
This paper presents a detailed analysis of traces of DNS and associated TCP traffic collected on the Internet links of the MIT Laboratory for Computer Science and the Korea Advance...
Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert ...
91
Voted
CCR
2002
86views more  CCR 2002»
14 years 9 months ago
Hop-by-hop routing algorithms for premium traffic
In Differentiated Service (DiffServ) networks, the routing algorithms used by the premium class traffic, due to the high priority afforded to that traffic, may have a significant ...
Jun Wang, Klara Nahrstedt
CN
2000
114views more  CN 2000»
14 years 9 months ago
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes
ATM networks are widely adopted as backbone networks. TCP/IP are the most popular protocols today and it is quite possible that packets are forwarded by ATM networks. In ATM netwo...
Wei Kuang Lai, Mu-Rung Shiu