Sciweavers

2947 search results - page 87 / 590
» The timely token protocol
Sort
View
STOC
2003
ACM
96views Algorithms» more  STOC 2003»
16 years 4 months ago
Optimal oblivious routing in polynomial time
A recent seminal result of R?acke is that for any network there is an oblivious routing algorithm with a polylog competitive ratio with respect to congestion. Unfortunately, R?ack...
Yossi Azar, Edith Cohen, Amos Fiat, Haim Kaplan, H...
PRDC
2007
IEEE
15 years 10 months ago
RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks
We consider scheduling real-time distributable threads in the presence of node/link failures and message losses in large-scale network systems. We present a distributed scheduling...
Kai Han, Binoy Ravindran, E. Douglas Jensen
VTC
2007
IEEE
100views Communications» more  VTC 2007»
15 years 10 months ago
Space-Time Trellis Coding Exploiting Superimposed Transmissions in Half-Duplex Relay Networks
— This work presents and analyzes a cooperative relaying approach which offers large scale spatial diversity and an additional coding advantage in a virtual antenna array. It uti...
Peter Rost, Gerhard Fettweis
CCS
2009
ACM
15 years 11 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
NOSSDAV
2005
Springer
15 years 10 months ago
Hierarchical disk sharing for multimedia systems
Systems that use or serve multimedia data require timely access to data on hard drives. To ensure adequate performance users must either prevent overload of disk resources, or use...
Joel C. Wu, Scott A. Banachowski, Scott A. Brandt