Sciweavers

2200 search results - page 201 / 440
» Hop Integrity in Computer Networks
Sort
View
NCA
2005
IEEE
15 years 9 months ago
Fundamental Network Processor Performance Bounds
In this paper, fundamental conditions which bound the network processing unit (NPU) worst-case performance are established. In particular, these conditions formalize and integrate...
Hao Che, Chethan Kumar, Basavaraj Menasinahal
137
Voted
DSN
2000
IEEE
15 years 8 months ago
A Reliable Many-to-Many Multicast Protocol for Group Communication over ATM Networks
Reliable many-to-many multicasting of messages is an integral part of group communication systems. Such systems typically employ a reliable multicast protocol that operates below ...
Ruppert R. Koch, Louise E. Moser, P. M. Melliar-Sm...
138
Voted
LCN
2000
IEEE
15 years 8 months ago
Intra-domain Bandwidth Management in Differentiated Services Network
In absence of any link layer traffic controls or priorityqueuing mechanism in LAN infrastructure (such as shared media LAN), Subnet Bandwidth Management based approach of managing...
Sanjay Jha, Mahbub Hassan, Priyadarsi Nanda, Nadee...
CCGRID
2004
IEEE
15 years 7 months ago
A reputation-based trust management system for P2P networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pa...
132
Voted
PERCOM
2010
ACM
15 years 2 months ago
Sharing using social networks in a composable Web of Things
Abstract—In the emerging “Web of Things”, digitally augmented everyday objects are seamlessly integrated to the Web by reusing Web patterns such as REST. This results in an e...
Dominique Guinard, Mathias Fischer, Vlad Trifa