Sciweavers

1576 search results - page 30 / 316
» Periodic Merging Networks
Sort
View
NDSS
1999
IEEE
15 years 4 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
MM
2006
ACM
125views Multimedia» more  MM 2006»
15 years 5 months ago
Scalable streaming for heterogeneous clients
Periodic broadcast protocols enable the efficient streaming of highly popular media files to large numbers of concurrent clients. Most previous periodic broadcast protocols, howe...
Liqi Shi, Phillipa Sessini, Anirban Mahanti, Zongp...
P2P
2007
IEEE
113views Communications» more  P2P 2007»
15 years 6 months ago
Handling Network Partitions and Mergers in Structured Overlay Networks
Structured overlay networks form a major class of peerto-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-s...
Tallat M. Shafaat, Ali Ghodsi, Seif Haridi
ICN
2009
Springer
15 years 6 months ago
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Pavel Mach, Zdenek Becvar, Robert Bestak
ISCC
2009
IEEE
129views Communications» more  ISCC 2009»
15 years 6 months ago
Handling dynamics in gossip-based aggregation schemes
A problem in large and dynamic networks consists in making available at each node global information about the state of the network. Gossip-based aggregation schemes are a simple ...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli