Sciweavers

3107 search results - page 490 / 622
» Parallel Communication
Sort
View
120
Voted
CLUSTER
2005
IEEE
15 years 8 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
101
Voted
COLCOM
2005
IEEE
15 years 8 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
112
Voted
ICDCSW
2005
IEEE
15 years 8 months ago
Capacity Estimation of Non-Synchronous Covert Channels
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Zhenghong Wang, Ruby B. Lee
INFOCOM
2005
IEEE
15 years 8 months ago
Predicting Internet end-to-end delay: a multiple-model approach
This paper presents a novel approach to predict the Internet end-to-end delay using multiple-model (MM) methods. The basic idea of the MM method is to assume the system dynamics c...
Ming Yang, Jifeng Ru, X. Rong Li, Huimin Chen, Anw...
123
Voted
ISCC
2005
IEEE
119views Communications» more  ISCC 2005»
15 years 8 months ago
A Systematic Approach to Building High Performance Software-Based CRC Generators
—A framework for designing a family of novel fast CRC generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optim...
Michael E. Kounavis, Frank L. Berry