Sciweavers

2947 search results - page 126 / 590
» The timely token protocol
Sort
View
INFOCOM
1998
IEEE
15 years 9 months ago
An End-to-End Reliable Multicast Protocol Using Polling for Scaleability
Reliable sender-based one-to-many protocols do not scale well due mainly to implosion caused by excessive rate of feedback packets arriving from receivers. We show that this probl...
Marinho P. Barcellos, Paul D. Ezhilchelvan
EUROPAR
2004
Springer
15 years 8 months ago
Profiling Grid Data Transfer Protocols and Servers
The trend of data intensive grid applications has brought grid storage protocols and servers into focus. The objective of this study is to gain an understanding of how time is spen...
George Kola, Tevfik Kosar, Miron Livny
148
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
ICMAS
1998
15 years 6 months ago
An Adaptive Choice of Messaging Protocol in Multi Agent Systems
abstract, form of this problem, we use a mathematical analysis to show that three different messaging protocols result in varying message loads, depending on certain parameters suc...
Chris Preist, Siani Pearson
126
Voted
CORR
2010
Springer
72views Education» more  CORR 2010»
15 years 4 months ago
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worstcase sys...
Kenneth W. Shum, Wing Shing Wong