Sciweavers

1080 search results - page 96 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
100
Voted
SRDS
2000
IEEE
15 years 2 months ago
Using Multicast Communication to Reduce Deadlock in Replicated Databases
Obtaining good performance from a distributed replicated database that allows update transactions to originate at any site while ensuring one-copy serializability is a challenge. ...
JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim
VTC
2007
IEEE
129views Communications» more  VTC 2007»
15 years 4 months ago
Cross-Layer Partner-Based Fast Handoff Mechanism for IEEE 802.11 Wireless Networks
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...
Yuh-Shyan Chen, Wei-Han Hsiao, Kau-Lin Chiu
JSAC
2010
131views more  JSAC 2010»
14 years 8 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
15 years 4 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...