Sciweavers

1080 search results - page 123 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
EUROSYS
2007
ACM
15 years 7 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
INFOCOM
2010
IEEE
14 years 8 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
JSAC
2010
122views more  JSAC 2010»
14 years 8 months ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
ACSAC
2001
IEEE
15 years 1 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah
HPCC
2007
Springer
15 years 4 months ago
Improving a Fault-Tolerant Routing Algorithm Using Detailed Traffic Analysis
Currently, some coarse measures like global network latency are used to compare routing protocols. These measures do not provide enough insight of traffic distribution among networ...
Abbas Nayebi, Arash Shamaei, Hamid Sarbazi-Azad