Sciweavers

1692 search results - page 319 / 339
» Practical, distributed network coordinates
Sort
View
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
15 years 5 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
IMC
2003
ACM
15 years 5 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
VIP
2003
15 years 1 months ago
Web-based Multimedia GP Medical System
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Chee Chern Lim, Man Hing Yu, Jesse J. Jin
DAIS
2009
15 years 25 days ago
Fault-Tolerant Aggregation by Flow Updating
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
CORR
2010
Springer
80views Education» more  CORR 2010»
14 years 11 months ago
Multi-path Probabilistic Available Bandwidth Estimation through Bayesian Active Learning
Knowing the largest rate at which data can be sent on an end-to-end path such that the egress rate is equal to the ingress rate with high probability can be very practical when ch...
Frederic Thouin, Mark Coates, Michael Rabbat