Sciweavers

395 search results - page 52 / 79
» Metrics for the Evaluation of Multicast Communications
Sort
View
106
Voted
IEEECIT
2010
IEEE
14 years 9 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
92
Voted
ICPADS
2010
IEEE
14 years 8 months ago
Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks
Online Social Networks (OSNs) are more and more popular recently; people may through them interact with each other for the purpose of social intercourse. The client/server OSN arch...
Jehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu
SAC
2002
ACM
14 years 10 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
107
Voted
ICPP
2006
IEEE
15 years 5 months ago
Data Transfers between Processes in an SMP System: Performance Study and Application to MPI
— This paper focuses on the transfer of large data in SMP systems. Achieving good performance for intranode communication is critical for developing an efficient communication s...
Darius Buntinas, Guillaume Mercier, William Gropp
INFOCOM
2008
IEEE
15 years 5 months ago
Characterizing and Modelling Clustering Features in AS-Level Internet Topology
The AS-level Internet topology has shown significant clustering features. In this paper, we propose a new set of clustering metrics and conduct extensive measurement on the AS-le...
Yan Li, Jun-Hong Cui, Dario Maggiorini, Michalis F...