Sciweavers

4761 search results - page 186 / 953
» Performance of Protocols
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
IJHPCA
2006
117views more  IJHPCA 2006»
15 years 4 months ago
MPICH-V Project: A Multiprotocol Automatic Fault-Tolerant MPI
Abstract-- High performance computing platforms like Clusters, Grid and Desktop Grids are becoming larger and subject to more frequent failures. MPI is one of the most used message...
Aurelien Bouteiller, Thomas Hérault, G&eacu...
IWDC
2001
Springer
210views Communications» more  IWDC 2001»
15 years 8 months ago
Access Control Protocols for Interconnected WDM Rings in the DAVID Metro Network
DAVID (Data And Voice Integration over D-WDM) is a research project sponsored by the European Community aimed at the design of an optical packet-switched network for the transport ...
Andrea Bianco, Giulio Galante, Emilio Leonardi, Fa...
SIGMETRICS
2004
ACM
15 years 9 months ago
Multicast protocols for scalable on-demand download
Previous scalable protocols for downloading large, popular files from a single server include batching and cyclic multicast. With batching, clients wait to begin receiving a reque...
Niklas Carlsson, Derek L. Eager, Mary K. Vernon
IJWET
2010
142views more  IJWET 2010»
15 years 2 months ago
Interaction protocol mediation in web service composition
: This article presents a mediation framework supporting the integration of web services in orchestrated and choreographed services and the conciliation of interaction protocol mis...
Liliana Ardissono, Roberto Furnari, Giovanna Petro...