Sciweavers

7329 search results - page 1387 / 1466
» Network Extractor Protocols
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
134
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
Stochastic Modeling of TCP over Lossy Links
—An analytical framework for modeling the performance of a single TCP session in the presence of random packet loss is presented. A Markovian approach is developed that allows us...
Alhussein A. Abouzeid, Sumit Roy, Murat Azizoglu
125
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
Consideration of Receiver Interest for IP Multicast Delivery
—Large-scale applications are characterized by a large number of dynamic and often interactive group members. The nature of these applications is such that participants are not i...
Brian Neil Levine, Jon Crowcroft, Christophe Diot,...
147
Voted
IPPS
2000
IEEE
15 years 7 months ago
Quality of Service Negotiation for Distributed, Dynamic Real-Time Systems
Dynamic, distributed, real-time systems control an environment that varies widely without any time-invariant statistical or deterministic characteristic, are spread across multiple...
Charles Cavanaugh, Lonnie R. Welch, Behrooz Shiraz...
119
Voted
SIGCOMM
2000
ACM
15 years 7 months ago
Endpoint admission control: Architectural issues and performance
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...
« Prev « First page 1387 / 1466 Last » Next »