Sciweavers

4761 search results - page 814 / 953
» Performance of Protocols
Sort
View
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 1 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
APWEB
2006
Springer
15 years 1 months ago
A Statistical Study of Today's Gnutella
Abstract. As a developing P2P system, Gnutella has upgraded its protocol to 0.6, which significantly changed the characteristics of its hosts. However, few previous work has given ...
Shicong Meng, Cong Shi, Dingyi Han, Xing Zhu, Yong...
112
Voted
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
15 years 1 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe
COOPIS
2004
IEEE
15 years 1 months ago
Eager Replication for Stateful J2EE Servers
Abstract. Replication has been widely used in J2EE servers for reliability and scalability. There are two properties which are important for a stateful J2EE application server. Fir...
Huaigu Wu, Bettina Kemme, Vance Maverick
CAMAD
2006
IEEE
15 years 1 months ago
Enhancing reliable multicast transport to mitigate the impact of blockage
Mobile wireless communication is susceptible to signal blockage, which is loss of signal, typically due to physical obstruction, over a longer duration relative to fading. Measurem...
Stephen F. Bush, Orhan C. Imer, Praveen Kumar Gopa...