Sciweavers

2500 search results - page 385 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 5 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 5 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
15 years 5 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
CORR
2008
Springer
135views Education» more  CORR 2008»
15 years 5 months ago
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving i...
Ijaz Haider Naqvi, Tanguy Pérennou
CN
2006
88views more  CN 2006»
15 years 5 months ago
Relevance of massively distributed explorations of the Internet topology: Qualitative results
Internet maps are generally constructed using the traceroute tool from a few sources to many destinations. It appeared recently that this exploration process gives a partial and bi...
Jean-Loup Guillaume, Matthieu Latapy, Damien Magon...