Sciweavers

7329 search results - page 1325 / 1466
» Network Extractor Protocols
Sort
View
127
Voted
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 3 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
139
Voted
IJCOMSYS
2007
88views more  IJCOMSYS 2007»
15 years 3 months ago
Potential performance bottleneck in Linux TCP
TCP is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches h...
Wenji Wu, Matt Crawford
121
Voted
SIGMETRICS
2008
ACM
15 years 3 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
119
Voted
IJIPT
2007
111views more  IJIPT 2007»
15 years 3 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss
IJISEC
2007
87views more  IJISEC 2007»
15 years 3 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
« Prev « First page 1325 / 1466 Last » Next »