Sciweavers

275 search results - page 5 / 55
» The Polling Primitive for Computer Networks
Sort
View
ICNP
2000
IEEE
15 years 1 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
PE
2007
Springer
118views Optimization» more  PE 2007»
14 years 9 months ago
An empirical study of reliable multicast protocols over Ethernet-connected networks
Recent advances in multicasting over the Internet present new opportunities for improving communication performance in clusters of workstations. The standard IP multicast, however...
Ryan G. Lane, Scott Daniels, Xin Yuan
ICC
2008
IEEE
150views Communications» more  ICC 2008»
15 years 3 months ago
Adaptive Modulation-Based TCP-Aware Uplink Scheduling in IEEE 802.16 Networks
— In this paper we propose polling based uplink scheduling schemes for TCP based applications in a multipointto-point fixed broadband IEEE 802.16 network. Our schemes adapt the ...
Hemant Kumar Rath, Abhay Karandikar, Vishal Sharma
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
14 years 10 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
CCS
2008
ACM
14 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig