Sciweavers

2947 search results - page 150 / 590
» The timely token protocol
Sort
View
HPDC
2000
IEEE
15 years 9 months ago
Synchronizing Network Probes to Avoid Measurement Intrusiveness with the Network Weather Service
In this paper we present a scalable protocol for conducting periodic probes of network performance in a way that minimizes collisions between separate probes. The goal of the prot...
Richard Wolski, Benjamin Gaidioz, Bernard Touranch...
ICC
2000
IEEE
157views Communications» more  ICC 2000»
15 years 9 months ago
Adaptive Reliable Multicast
We present a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the ...
Jaehee Yoon, Azer Bestavros, Ibrahim Matta
GLOBECOM
2009
IEEE
15 years 9 months ago
CoRe-MAC: A MAC-Protocol for Cooperative Relaying in Wireless Networks
Cooperative relaying methods can improve wireless links, but introduce overhead due to relay selection and resource reservation compared to non-cooperative transmission. In order t...
Helmut Adam, Wilfried Elmenreich, Christian Bettst...
158
Voted
ASIACRYPT
2001
Springer
15 years 8 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
127
Voted
SEC
2003
15 years 6 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel