Sciweavers

7839 search results - page 1377 / 1568
» What's there and what's not
Sort
View
INFOCOM
2003
IEEE
15 years 6 months ago
A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks
While the backbone networks have experienced substantial changes in the last decade; the access networks have not changed much. Recently, passive optical networks (PONs) seem to be...
Maode Ma
INFOCOM
2003
IEEE
15 years 6 months ago
A Framework for Reliable Routing in Mobile Ad Hoc Networks
— Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple nodedisjoint paths f...
Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K....
IV
2003
IEEE
200views Visualization» more  IV 2003»
15 years 6 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
MSS
2003
IEEE
173views Hardware» more  MSS 2003»
15 years 6 months ago
Peabody: The Time Travelling Disk
Disk drives are now available with capacities on the order of hundreds of gigabytes. What has not become available is an easy way to manage storage. With installed machines locate...
Charles B. Morrey III, Dirk Grunwald
NDSS
2003
IEEE
15 years 6 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
« Prev « First page 1377 / 1568 Last » Next »