Sciweavers

1080 search results - page 65 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ACISP
2008
Springer
14 years 11 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
IJIPT
2006
58views more  IJIPT 2006»
14 years 10 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...
KDD
1998
ACM
146views Data Mining» more  KDD 1998»
15 years 2 months ago
Mining Association Rules in Hypertext Databases
In this workweproposea generalisation of the notion of associationrule in the contextof flat transactions to that of a compositeassociation rule in the context of a structured dir...
José Borges, Mark Levene
WSC
1997
14 years 11 months ago
New Development of Optimal Computing Budget Allocation for Discrete Event Simulation
This paper deals with ranking and selection problem via simulation. We present an optimal computing budget allocation technique which can select the best of k simulated designs. T...
Hsiao-Chang Chen, Chun-Hung Chen, Liyi Dai, Enver ...
JCIT
2010
151views more  JCIT 2010»
14 years 4 months ago
A Flexible Resource Location Protocol for Peer-to-Peer Network
An important and fundamental issue in designing structured peer-to-peer networks is the tradeoff between the number of logical links and the number of hops. We present a flexible ...
Xu Xiang