Sciweavers

1777 search results - page 180 / 356
» Programming Cryptographic Protocols
Sort
View
CCGRID
2005
IEEE
15 years 3 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien
ECIS
2003
15 years 2 months ago
Re-negotiating protocols: a way to integrate groupware in collaborative learning settings
Research is being done within the Computer Supported Collaborative Learning community to investigate how to apply the approach of Problem Oriented Project Pedagogy in distance lea...
Pernille Bjørn Rasmussen
HCI
2009
14 years 11 months ago
The Evolution of a Web Accessibility Testing Protocol
In early 2007, the California State University (CSU) system initiated a program to make all information technology accessible to persons with disabilities; the authors were appoint...
Tom Jewett, Wayne Dick
DATE
2009
IEEE
131views Hardware» more  DATE 2009»
15 years 4 months ago
Optimizations of an application-level protocol for enhanced dependability in FlexRay
FlexRay [9] is an automotive standard for high-speed and reliable communication that is being widely deployed for next generation cars. The protocol has powerful errordetection me...
Wenchao Li, Marco Di Natale, Wei Zheng, Paolo Gius...
ICALP
2004
Springer
15 years 6 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler