Sciweavers

1180 search results - page 162 / 236
» Interaction Protocols in Agentis
Sort
View
103
Voted
MASCOTS
2003
15 years 2 months ago
Creating Realistic BGP Models
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lea...
Xenofontas A. Dimitropoulos, George F. Riley
IJACT
2008
64views more  IJACT 2008»
15 years 1 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
88
Voted
CN
2007
74views more  CN 2007»
15 years 1 months ago
SSVP: A congestion control scheme for real-time video streaming
In this paper, we present a new end-to-end protocol, namely Scalable Streaming Video Protocol (SSVP), which operates on top of UDP and is optimized for unicast video streaming app...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
97
Voted
INFSOF
2006
81views more  INFSOF 2006»
15 years 1 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
128
Voted
JSAC
2008
95views more  JSAC 2008»
15 years 1 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras