Sciweavers

1362 search results - page 189 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
NDSS
2009
IEEE
15 years 9 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
POLICY
2005
Springer
15 years 8 months ago
Adding Policy-Based Control to Mobile Hosts Switching between Streaming Proxies
We add a simple policy-based control component to mobile hosts that enables them to control the continuous reception of live multimedia content (e.g. a TV broadcast) while they sw...
Malohat Ibrohimovna Kamilova, Cristian Hesselman, ...
ICNP
2005
IEEE
15 years 8 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy
CN
2002
77views more  CN 2002»
15 years 2 months ago
MATE: multipath adaptive traffic engineering
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently exist in Internet Service Provider Networks. As a...
Anwar Elwalid, Cheng Jin, Steven H. Low, Indra Wid...
SIGCOMM
2005
ACM
15 years 8 months ago
One more bit is enough
Achieving efficient and fair bandwidth allocation while minimizing packet loss in high bandwidth-delay product networks has long been a daunting challenge. Existing endto-end cong...
Yong Xia, Lakshminarayanan Subramanian, Ion Stoica...