Sciweavers

358 search results - page 47 / 72
» Protocols from perceptual observations
Sort
View
AINTEC
2005
Springer
15 years 3 months ago
Application-Level Versus Network-Level Proximity
Abstract. We motivate in this paper the need for application-level proximity. This proximity is a function of network characteristics that decide on the application performance. Mo...
Mohammad Malli, Chadi Barakat, Walid Dabbous
CN
2006
126views more  CN 2006»
14 years 10 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann

Publication
189views
16 years 8 months ago
Packet Trains-Measurements and a New Model for Computer Network Traffic
Traffic measurements on a ring local area computer network at the Massachusetts Institute of Technology are presented. The analysis of the arrival pattern shows that the arrival pr...
R. Jain, S. Routhier
EUROCRYPT
2009
Springer
15 years 10 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
MOBILITY
2009
ACM
15 years 4 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...