Sciweavers

7329 search results - page 1298 / 1466
» Network Extractor Protocols
Sort
View
TON
2010
93views more  TON 2010»
14 years 10 months ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone
SOSP
2007
ACM
16 years 26 days ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
GI
2004
Springer
15 years 9 months ago
Distributed Job Scheduling in a Peer-to-Peer Video Recording System
: Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research e...
Curt Cramer, Kendy Kutzner, Thomas Fuhrmann
WWW
2004
ACM
16 years 4 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
WWW
2003
ACM
16 years 4 months ago
Peer-to-peer architecture for content-based music retrieval on acoustic data
In traditional peer-to-peer search networks, operations focus on properly labeled files such as music or video, and the actual search is often limited to text tags. The explosive ...
Cheng Yang
« Prev « First page 1298 / 1466 Last » Next »