Sciweavers

1080 search results - page 66 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
FMOODS
2003
14 years 11 months ago
Design and Verification of Distributed Multi-media Systems
Performance analysis of computing systems, in particular distributed computing systems, is a complex process. Analysing the complex flows and interactions between a set of distribu...
David H. Akehurst, John Derrick, A. Gill Waters
MSWIM
2009
ACM
15 years 4 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
AINA
2007
IEEE
15 years 4 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
TWC
2010
14 years 4 months ago
Multi-hop MIMO relay networks: diversity-multiplexing trade-off analysis
A multi-hop relay network with multiple antenna terminals in a quasi-static slow fading environment is considered. The fundamental diversity-multiplexing gain tradeoff (DMT) is an...
Deniz Gündüz, Mohammad Ali Khojastepour,...
ICS
2007
Tsinghua U.
15 years 4 months ago
Optimization and bottleneck analysis of network block I/O in commodity storage systems
Building commodity networked storage systems is an important architectural trend; Commodity servers hosting a moderate number of consumer-grade disks and interconnected with a hig...
Manolis Marazakis, Vassilis Papaefstathiou, Angelo...