Sciweavers

117 search results - page 20 / 24
» Using Group Communication to Implement a Fault-Tolerant Dire...
Sort
View
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 5 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
14 years 10 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
INFOCOM
2000
IEEE
15 years 4 months ago
RMX: Reliable Multicast for Heterogeneous Networks
—Although IP Multicast is an effective network primitive for best-effort, large-scale, multi-point communication, many multicast applications such as shared whiteboards, multi-pl...
Yatin Chawathe, Steven McCanne, Eric A. Brewer
104
Voted
INFOCOM
1998
IEEE
15 years 3 months ago
An Error Control Scheme for Large-Scale Multicast Applications
Retransmission based error control for large scale multicast applications is difficult because of implosion and exposure. Existing schemes (SRM, RMTP, TMTP, LBRRM) have good solut...
Christos Papadopoulos, Guru M. Parulkar, George Va...
SECON
2008
IEEE
15 years 6 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...