Sciweavers

404 search results - page 37 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
142
Voted
ESCIENCE
2007
IEEE
15 years 10 months ago
Binary Data Transfer Performance over High-Latency Networks Using Web Service Attachments
One of the objectives of e-Research is to help scientists to accomplish their research, including scientific experiments, more effectively and efficiently. Web services provide ...
Donglai Zhang, Paul D. Coddington, Andrew L. Wende...
119
Voted
MONET
2010
187views more  MONET 2010»
15 years 2 months ago
A Proxy Mobile IPv6 Based Global Mobility Management Architecture and Protocol
This paper specifies a global mobility management architecture and protocol procedure called GPMIP, which is based on Proxy Mobile IPv6. In GPMIP, mobility management is performed ...
Huachun Zhou, Hongke Zhang, Yajuan Qin, Hwang-Chen...
122
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
On the Performance of Access Strategies for MIMO Ad Hoc Networks
— In this paper, we address the impact of different access strategies in ad hoc networks with multiple antennas and MIMO communications. We employ a cross–layer designed MAC pr...
Marco Levorato, Paolo Casari, Michele Zorzi
134
Voted
SIGCOMM
2005
ACM
15 years 9 months ago
HLP: a next generation inter-domain routing protocol
It is well-known that BGP, the current inter-domain routing protocol, has many deficiencies. This paper describes a hybrid link-state and path-vector protocol called HLP as an al...
Lakshminarayanan Subramanian, Matthew Caesar, Chen...
124
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...