Sciweavers

146 search results - page 23 / 30
» cn 2006
Sort
View
CN
2006
62views more  CN 2006»
14 years 9 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
CN
2006
86views more  CN 2006»
14 years 9 months ago
Stochastic analysis of packet-pair probing for network bandwidth estimation
In this paper, we perform a stochastic analysis of the packet-pair technique, which is a widely used method for estimating the network bandwidth in an end-to-end manner. There has...
Kyung-Joon Park, Hyuk Lim, Chong-Ho Choi
CN
2006
61views more  CN 2006»
14 years 9 months ago
Structuring topologically aware overlay networks using domain names
Abstract-- Overlay networks are application layer systems which facilitate users in performing distributed functions such as searches over the contents of other users. An important...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki
CN
2006
106views more  CN 2006»
14 years 9 months ago
Model-based end-to-end available bandwidth inference using queueing analysis
End-to-end available bandwidth estimation between Internet hosts is important to understand network congestion and enhance the performance of Quality-of-Service (QoS) demanding ap...
Xiaojun Hei, Brahim Bensaou, Danny H. K. Tsang
CN
2006
79views more  CN 2006»
14 years 9 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien