Sciweavers

10899 search results - page 22 / 2180
» Wide Area Computation
Sort
View
119
Voted
ICISC
2008
89views Cryptology» more  ICISC 2008»
15 years 3 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
DPD
1998
141views more  DPD 1998»
15 years 1 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...
121
Voted
IAJIT
2010
115views more  IAJIT 2010»
15 years 12 days ago
Measurement of V2oIP over wide area network between countries using soft phone and USB phone
: In this research, we propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP tech...
Mohd Ismail
ICCS
2004
Springer
15 years 7 months ago
Global Discovery Service for JMX Architecture
Distributed computing in wide area networks requires special approach to solve the problem of communication between secure areas. Since there is no possibility to establish connect...
Jacek Midura, Kazimierz Balos, Krzysztof Zielinski
OSDI
2004
ACM
16 years 2 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...