Sciweavers

4435 search results - page 160 / 887
» Networking named content
Sort
View
154
Voted
SCN
2008
Springer
15 years 4 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
ICS
2005
Tsinghua U.
15 years 10 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
147
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 5 months ago
A New Phase Transition for Local Delays in MANETs
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
François Baccelli, Bartek Blaszczyszyn
IJMMS
2007
91views more  IJMMS 2007»
15 years 4 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu
167
Voted
JCIT
2007
190views more  JCIT 2007»
15 years 4 months ago
A Two-layer Super-Peer based P2P Live Media Streaming System
Peer-to-peer (P2P) file sharing has become increasingly popular, accounting for as much as 70% of Internet traffic by some estimates. Recently, we have been witnessing the emergen...
Poo Kuan Hoong, Hiroshi Matsuo