Sciweavers

2500 search results - page 385 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 10 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
CLEIEJ
2008
88views more  CLEIEJ 2008»
14 years 10 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
14 years 10 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
CORR
2008
Springer
135views Education» more  CORR 2008»
14 years 10 months ago
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving i...
Ijaz Haider Naqvi, Tanguy Pérennou
CN
2006
88views more  CN 2006»
14 years 10 months ago
Relevance of massively distributed explorations of the Internet topology: Qualitative results
Internet maps are generally constructed using the traceroute tool from a few sources to many destinations. It appeared recently that this exploration process gives a partial and bi...
Jean-Loup Guillaume, Matthieu Latapy, Damien Magon...