Sciweavers

13180 search results - page 2351 / 2636
» Network Models
Sort
View
CCR
2008
110views more  CCR 2008»
15 years 4 months ago
Operational comparison of available bandwidth estimation tools
The available bandwidth of a path directly impacts the performance of throughput sensitive applications, e.g., p2p content replication or podcasting. Several tools have been devis...
Guillaume Urvoy-Keller, Taoufik En-Najjary, Alessa...
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JUCS
2008
149views more  JUCS 2008»
15 years 4 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
TASE
2008
IEEE
15 years 4 months ago
Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design
In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent...
Dinesh Garg, Y. Narahari
« Prev « First page 2351 / 2636 Last » Next »