Sciweavers

7329 search results - page 390 / 1466
» Network Extractor Protocols
Sort
View
136
Voted
CONEXT
2008
ACM
15 years 6 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
114
Voted
PST
2008
15 years 6 months ago
Unlinkable Communication
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...
BMCBI
2007
108views more  BMCBI 2007»
15 years 5 months ago
Integrating sequence and structural biology with DAS
Background: The Distributed Annotation System (DAS) is a network protocol for exchanging biological data. It is frequently used to share annotations of genomes and protein sequenc...
Andreas Prlic, Thomas A. Down, Eugene Kulesha, Rob...
144
Voted
ICNP
1998
IEEE
15 years 9 months ago
Evaluating the Overheads of Source-Directed Quality-of-Service Routing
Quality-of-service (QoS) routing satisfiesapplication performance requirements and optimizes network resource usage but effective path-selection schemes require the distribution o...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
MOBIHOC
2002
ACM
16 years 4 months ago
Routing performance in the presence of unidirectional links in multihop wireless networks
We examine two aspects concerning the influence of unidirectional links on routing performance in multihop wireless networks. In the first part of the paper, we evaluate the benef...
Mahesh K. Marina, Samir Ranjan Das