Sciweavers

3053 search results - page 482 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
HICSS
2002
IEEE
108views Biometrics» more  HICSS 2002»
15 years 9 months ago
Network Management in ATM LEO Satellite Networks
Development of the past decade have confirmed that ATM technology has the potential of becoming the transport mechanism in many multimedia networks where high-speed traffic and Qu...
Petia Todorova
ICNP
2002
IEEE
15 years 9 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
DEBS
2007
ACM
15 years 8 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
137
Voted
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 5 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
TWC
2008
156views more  TWC 2008»
15 years 3 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou