Sciweavers

1047 search results - page 183 / 210
» Using Objects for Next Generation Communication Services
Sort
View
DSRT
2008
IEEE
15 years 4 months ago
Interfacing and Coordination for a DEVS Simulation Protocol Standard
The DEVS formalism has been adopted and developed independently by many research teams, which led to various DEVS implementation versions. Consequently, different DEVS implementat...
Khaldoon Al-Zoubi, Gabriel A. Wainer
INFOCOM
2006
IEEE
15 years 3 months ago
Mistreatment in Distributed Caching Groups: Causes and Implications
— Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the...
Nikolaos Laoutaris, Georgios Smaragdakis, Azer Bes...
P2P
2009
IEEE
114views Communications» more  P2P 2009»
15 years 4 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
99
Voted
IWAI
1999
Springer
15 years 1 months ago
Listen to Your Heart Rate: Counting the Cost of Media Quality
Networked multimedia applications, such as videoconferencing, offer great communicative opportunities. Since the financial cost of using such a service increases in line with the q...
Gillian M. Wilson, Martina Angela Sasse
83
Voted
ESORICS
2008
Springer
14 years 11 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi