Sciweavers

798 search results - page 38 / 160
» Statecharts as Protocols for Objects
Sort
View
INFOCOM
1996
IEEE
15 years 4 months ago
A Reliable, Adaptive Network Protocol for Video Transport
In thispaper, we present anadaptive networklayer protocol for VBR video transport. It: (1) minimizes buffer requirement in the network whileguaranteeingthat packets of VBR encoded...
Pawan Goyal, Harrick M. Vin, Chia Shen, Prashant J...
CONEXT
2007
ACM
15 years 3 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
WICSA
2008
15 years 1 months ago
A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation
Service composition is one of the key objectives for adopting Service Oriented Architecture. Today, web services, however, are not always perfectly compatible and composition mism...
Xitong Li, Yushun Fan, Jian Wang, Li Wang, Feng Ji...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 5 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ICALP
2005
Springer
15 years 5 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor