Sciweavers

1660 search results - page 276 / 332
» Forwarding in a content-based network
Sort
View
WWW
2001
ACM
16 years 15 days ago
Mixed-initiative, multi-source information assistants
While the information resources on the Web are vast, the sources are often hard to find, painful to use, and difficult to integrate. We have developed the Heracles framework for b...
Craig A. Knoblock, Steven Minton, José Luis...
PERCOM
2007
ACM
15 years 11 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
NCA
2009
IEEE
15 years 6 months ago
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast
—This paper presents QuoCast, a resource-aware protocol for reliable stream diffusion in unreliable environments, where processes may crash and communication links may lose messa...
Mouna Allani, Benoît Garbinato, Amirhossein ...
NOCS
2009
IEEE
15 years 6 months ago
Comparing tightly and loosely coupled mesochronous synchronizers in a NoC switch architecture
With the advent of Networks-on-Chip (NoCs), the interest for mesochronous synchronizers is again on the rise due to the intricacies of skew-controlled chip-wide clock tree distrib...
Daniele Ludovici, Alessandro Strano, Davide Bertoz...
INFOCOM
2009
IEEE
15 years 6 months ago
Greedy Routing with Bounded Stretch
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...