Sciweavers

7329 search results - page 1191 / 1466
» Network Extractor Protocols
Sort
View
EUROCRYPT
2009
Springer
16 years 5 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
ICALP
2009
Springer
16 years 5 months ago
Functional Monitoring without Monotonicity
The notion of distributed functional monitoring was recently introduced by Cormode, Muthukrishnan and Yi [CMY08] to initiate a formal study of the communication cost of certain fu...
Chrisil Arackaparambil, Joshua Brody, Amit Chakrab...
MOBILITY
2009
ACM
15 years 11 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
APSCC
2008
IEEE
15 years 11 months ago
Hop-by-Hop TCP over MANET
In a MANET environment, communication links are unstable due to various reasons. Error rate is higher and bandwidth is smaller than fixed networks. Running conventional TCP protoco...
Yao-Nan Lien, Yi-Fan Yu
SIGCOMM
2006
ACM
15 years 10 months ago
MIRO: multi-path interdomain routing
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...
Wen Xu, Jennifer Rexford
« Prev « First page 1191 / 1466 Last » Next »