Sciweavers

7329 search results - page 409 / 1466
» Network Extractor Protocols
Sort
View
CCS
2004
ACM
15 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
INFOCOM
1999
IEEE
15 years 9 months ago
Improving Reliable Multicast Using Active Parity Encoding Services (APES)
We propose and evaluate novel reliable multicast protocols that combine active repair service (a.k.a. local recovery) and parity encoding (a.k.a. forward error correction or FEC) ...
Dan Rubenstein, Sneha Kumar Kasera, Donald F. Tows...
AINA
2010
IEEE
15 years 2 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti
SOSP
2003
ACM
16 years 2 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
15 years 6 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh