Sciweavers

1583 search results - page 218 / 317
» The Quorum Deployment Problem
Sort
View
ICDCSW
2002
IEEE
15 years 2 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
15 years 2 months ago
Algorithms and Sensors for Small Robot Path Following
Abstract— Tracked mobile robots in the 20 kg size class are under development for applications in urban reconnaissance. For efficient deployment, it is desirable for teams of ro...
Robert W. Hogg, Arturo L. Rankin, Stergios I. Roum...
INFOCOM
2002
IEEE
15 years 2 months ago
TCP-SMO: Extending TCP to Support Medium-Scale Multicast Applications
Abstract—Scalable reliable multicast protocols have been a focus of recent research, tackling the problem of efficient reliable data delivery to an arbitrarily large number of r...
Sam Liang, David R. Cheriton
INFOCOM
2002
IEEE
15 years 2 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
ISCC
2002
IEEE
15 years 2 months ago
A new approach to construct multicast trees in MPLS networks
In this paper1 , we present a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to...
Ali Boudani, Bernard Cousin