Sciweavers

422 search results - page 42 / 85
» Protocol Specialization
Sort
View
ICCCN
2008
IEEE
15 years 8 months ago
Security Extensions for Space-Link Communication
—In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a ...
Daniel Fischer, Mario Merri, Thomas Engel
IPPS
2008
IEEE
15 years 8 months ago
An MPI tool for automatically discovering the switch level topologies of Ethernet clusters
We present an MPI topology discovery tool for homogeneous Ethernet switched clusters. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Pr...
Joshua Lawrence, Xin Yuan
PERCOM
2008
ACM
15 years 8 months ago
TIGRA: Timely Sensor Data Collection Using Distributed Graph Coloring
In this paper we present a protocol for sensor applications that require periodic collection of raw data reports from the entire network in a timely manner. We formulate the probl...
Lilia Paradis, Qi Han
SAINT
2008
IEEE
15 years 8 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
VTC
2008
IEEE
112views Communications» more  VTC 2008»
15 years 8 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke