Sciweavers

1573 search results - page 140 / 315
» Reliable Communication in Overlay Networks
Sort
View
DATE
2010
IEEE
197views Hardware» more  DATE 2010»
14 years 5 months ago
Compilation of stream programs for multicore processors that incorporate scratchpad memories
The stream processing characteristics of many embedded system applications in multimedia and networking domains have led to the advent of stream based programming formats. Several ...
Weijia Che, Amrit Panda, Karam S. Chatha
WETICE
2009
IEEE
15 years 4 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
MOBIHOC
2007
ACM
15 years 9 months ago
Capacity of a wireless ad hoc network with infrastructure
In this paper we study the capacity of wireless ad hoc networks with infrastructure support of an overlay of wired base stations. Such a network architecture is often referred to ...
Benyuan Liu, Patrick Thiran, Donald F. Towsley
ETFA
2006
IEEE
15 years 4 months ago
Integrating Inaccessibility Control and Timer Management in CANELy
The CAN Enhanced Layer (CANELy) is a CAN-based infrastructure capable of extremely reliable communication. This paper describes the mechanisms and the techniques used in CANELy to...
José Rufino, Paulo Veríssimo, Carlos...
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan