Sciweavers

3053 search results - page 262 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
127
Voted
EURONGI
2008
Springer
15 years 4 months ago
A Seamless Vertical Handover Approach
Abstract-- Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in lite...
Rastin Pries, Dirk Staehle, Phuoc Tran-Gia, Thorst...
IMC
2010
ACM
15 years 8 days ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...
112
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore
ISORC
1998
IEEE
15 years 6 months ago
An Approach to Distributed Component-Based Real-Time Application Software Development
Component-based software development would allow application software be largely constructed, rather than programmed. This approach would dramatically improve the productivity of ...
Stephen S. Yau, Bing Xia
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 9 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...