Sciweavers

4761 search results - page 84 / 953
» Performance of Protocols
Sort
View
AINA
2007
IEEE
15 years 9 months ago
Trusted Gossip: A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing
Epidemic protocols such as gossip have proven to have many desirable properties for information sharing. However, trust is one of the issues that is yet to be examined with respec...
Arindam Mitra, Muthucumaru Maheswaran
ADVIS
2000
Springer
15 years 7 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
MOBICOM
2006
ACM
15 years 9 months ago
Advanced TCP evaluation testbed on mixed wired internet and satellite environments
In this paper, we present our Advanced TCP Evaluation Testbed on Mixed Wired Internet and Satellite Environments. Categories and Subject Descriptors C.2.2 [Network Protocols]:–A...
Rosario Firrincieli, Carlo Caini, Cesar Marcondes,...
ISW
2010
Springer
15 years 1 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
121
Voted
DSN
2008
IEEE
15 years 10 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...