|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Véronique Cortier, Stéphanie Delaune |
Safely composing security protocols. |
Formal Methods Syst. Des. |
2009 |
DBLP DOI BibTeX RDF |
Verification, Composition, Security protocols |
24 | Alain Cournier, Stéphane Devismes, Vincent Villain |
Light enabling snap-stabilization of fundamental protocols. |
ACM Trans. Auton. Adapt. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Self- and snap-stabilization, wave protocols, transformer |
24 | Ti Zhou, Mengjun Li, Zhoujun Li 0001 |
Local abstract verification and refinement of security protocols. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
verification, refinement, abstraction, security protocols |
24 | Khaled Ouafi, Raphael C.-W. Phan |
Traceable Privacy of Recent Provably-Secure RFID Protocols. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Authentication protocols, Untraceability |
24 | Willy Picard |
An Algebraic Algorithm for Structural Validation of Social Protocols. |
BIS |
2007 |
DBLP DOI BibTeX RDF |
algebraic representation of social protocols, semantical validation, structural validation, Collaboration modeling |
24 | Kumar Viswanath, Katia Obraczka, Gene Tsudik |
Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Ad hoc networks, mobile computing, multicast, wireless, routing protocols |
24 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
24 | Feng Zhao, Feng Xi, Zhong Liu |
An Energy-Balanced Strategy for Clustering Protocols in Wireless Sensor Networks. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Clustering protocols, Energy-balanced strategy, Sensor networks, Network lifetime |
24 | Farhan Siddiqui, Sherali Zeadally |
Mobility Protocols for Handoff Management in Heterogeneous Networks. (PDF / PS) |
PWC |
2006 |
DBLP DOI BibTeX RDF |
Mobility, Networks, Protocols, Heterogeneous, Handoff |
24 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the security of fair non-repudiation protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Fair non-repudiation, Security protocols, Protocol analysis, Protocol design |
24 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
OFMC: A symbolic model checker for security protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Model checking, Verification, Formal methods, Constraints, Security protocols |
24 | Jialiang Lu, Fabrice Valois, Dominique Barthel |
Range Adjustment for Broadcast Protocols with a Realistic Radio Transceiver Energy Model in Short-Range Wireless Networks. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
range adjustment, performance evaluation, energy model, broadcast protocols |
24 | Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, clustering, MAC protocols, jamming, denial-of-service attacks |
24 | Timothy G. Griffin, João L. Sobrinho |
Metarouting. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
algebraic routing, path algebras, routing protocols |
24 | David Sinclair, David Gray, Geoff W. Hamilton |
Synthesising Attacks on Cryptographic Protocols. |
ATVA |
2004 |
DBLP DOI BibTeX RDF |
security, model checking, cryptographic protocols |
24 | Levente Buttyán, István Vajda |
Towards provable security for ad hoc routing protocols. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability |
24 | Giorgio Delzanno |
Constraint-Based Verification of Parameterized Cache Coherence Protocols. |
Formal Methods Syst. Des. |
2003 |
DBLP DOI BibTeX RDF |
constraints, abstractions, symbolic model checking, cache coherence protocols |
24 | Lawrence Cabac, Daniel Moldt, Heiko Rölke |
A Proposal for Structuring Petri Net-Based Agent Interaction Protocols. |
ICATPN |
2003 |
DBLP DOI BibTeX RDF |
agents, high-level Petri nets, Renew, AUML, reference nets, Mulan, agent interaction protocols |
24 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
e-commerce, zero-knowledge proofs, multisignatures, RSA signatures, Fair-exchange protocols |
24 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. |
ISLPED |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
24 | Michel Hurfin, Achour Mostéfaoui, Michel Raynal |
A Versatile Family of Consensus Protocols Based on Chandra-Toueg's Unreliable Failure Detectors. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
fault-tolerance, quorum, asynchronous distributed system, crash failure, unreliable failure detector, consensus problem, consensus protocols |
24 | Peter McBurney, Simon Parsons, Michael J. Wooldridge |
Desiderata for agent argumentation protocols. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
argumentation, interaction protocols, agent communication languages, FIPA, dialogue games |
24 | Mike Ritter, Robert J. Friday, Rodrigo Garcés, Weill San Filippo, Cuong-Thinh Nguyen |
Mobile connectivity protocols and throughput measurements in the Ricochet Microcellular data network (MCDN) system. |
MobiCom |
2001 |
DBLP DOI BibTeX RDF |
MCDN system architecture, Mobility, wireless networks, wireless routing, wireless protocols |
24 | Anindya Datta, Debra E. VanderMeer, Aslihan Celik, Vijay Kumar 0002 |
Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. |
ACM Trans. Database Syst. |
1999 |
DBLP DOI BibTeX RDF |
adaptive broadcast protocols, Internet, energy conservation, mobile databases, client-server computing |
24 | Jehan-François Pâris, Darrell D. E. Long, Patrick E. Mantey |
Zero-delay broadcasting protocols for video-on-demand. |
ACM Multimedia (1) |
1999 |
DBLP DOI BibTeX RDF |
pyramid broadcasting, video-on-demand, broadcasting protocols, compressed video |
24 | Chie Dou |
Formal Specification of Communication Protocols Based on a Timed-SDL: Validation and Performance Prospects. |
EUROMICRO |
1996 |
DBLP DOI BibTeX RDF |
Timed-SDL, performance prospects, CCITT Z.100, probabilistic specifications, performance evaluations, real time systems, formal specification, formal specification, validation, communication protocols, SDL, temporal properties, telecommunication systems, formal notation |
24 | Shubhendu S. Mukherjee, Mark D. Hill |
An evaluation of directory protocols for medium-scale shared-memory multiprocessors. |
International Conference on Supercomputing |
1994 |
DBLP DOI BibTeX RDF |
directory protocols, multiprocessors, shared-memory, cache coherence, gray code |
24 | Tuomas Aura, Michael Roe, Anish Mohammed |
Experiences with Host-to-Host IPsec. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Bruce Christianson |
Anonymous Context Based Role Activation Mechanism. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Tuomas Aura |
Privacy, Control and Internet Mobility (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Bruce Christianson |
Introduction: Authentic Privacy. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Jari Arkko |
Authentication Components: Engineering Experiences and Guidelines. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Siva Sivavakeesar |
A mobility-based adaptive MAC for supporting real-time applications in multihop ad-hoc networks. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
quality of service aware MAC, IEEE 802.11, code division multiple access (CDMA), multiple access control (MAC), multihop ad hoc networks |
24 | Carme Àlvarez, Josep Díaz, Jordi Petit, José D. P. Rolim, Maria J. Serna |
Efficient and reliable high level communication in randomly deployed wireless sensor networks. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, ad hoc networks, middleware, random graphs |
24 | Christian Schindelhauer, Stefan Büttcher, Franz-Josef Rammig |
The design of PaMaNet the Paderborn mobile ad-hoc network. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
egoistic caching, mobile ad hoc network, peer-to-peer network, XML-database |
24 | Ross J. Anderson |
What We Can Learn from API Security. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella, Stefano Bistarelli, Fabio Massacci |
A Protocol's Life After Attacks.... |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Chris J. Mitchell, Paulo S. Pagliusi |
Is Entity Authentication Necessary? |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Roger M. Needham |
Keynote Address. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jan Jürjens |
Encapsulating Rules of Prudent Security Engineering. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras |
On the Negotiation of Access Control Policies. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Experiences of Mobile IP Security. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Jan Jürjens |
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella, Lawrence C. Paulson |
A Proof of Non-repudiation. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Frank Stajano |
The Resurrecting Duckling - What Next? (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Matt Blaze |
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella |
Lack of Explicitness Strikes Back (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Lawrence C. Paulson |
Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | |
Afterward. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Dieter Gollmann |
Insider Fraud (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Raphael Yahalom |
Optimistic Trust with Realistic eNvestigators (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Mostafa Saleh, Mourad Debbabi |
Modeling Security Protocols as Games. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Modeling cryptographic protocols, Security protocols, Game semantics |
23 | Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí |
Supporting amnesia in log-based recovery protocols. |
EATIS |
2007 |
DBLP DOI BibTeX RDF |
amnesia support, recovery protocols, transactional replicated systems, replication protocols |
23 | Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu |
Imposed Route Reuse in Ad Hoc Network Routing Protocols Using Structured Peer-to-Peer Overlay Routing. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
wireless, Wireless communication, routing protocols, network protocols |
23 | Christos Bouras, Apostolos Gkamas, Thrasyvoulos Tsiatsos |
Internet Protocols for Synchronous Distance Learning. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
tele-teaching, collaborative medicine, Internet based synchronous distance learning application, multimedia, protocols, distance learning, Internet protocols, Web pages, telematics, client-server model, tele-medicine |
23 | Lawrence Klos, Golden G. Richard III |
Julep: an environment for the evaluation of distributed process recovery protocols. |
PRDC |
2000 |
DBLP DOI BibTeX RDF |
Julep, distributed process recovery protocols, object-oriented testbed, process recovery mechanisms, UDP-based object communication service, reliable object-based communication service, Java, Java, protocols, object-oriented programming, programming environments, system recovery, telecommunication channels, recovery mechanisms, communication mechanism |
23 | Vassilios Tsaoussidis, Hussein G. Badr |
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
throughput performance gain, TCP-probing, battery-powered devices, service characteristics, standard TCP, probing mechanism, immediate recovery strategy, wired/wireless channels, TCP header, Tahoe, New Reno, energy performance, wireless networks, mobile devices, energy efficiency, congestion control, computer networks, transport protocols, communication protocols, error correction, energy conservation, error control, telecommunication congestion control, telecommunication standards, network environments, Reno, wired networks |
23 | Ka-Cheong Leung, Victor O. K. Li |
Generalized Load Sharing for Packet-Switching Networks. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
generalized load sharing, multipath communication networks, weighted fair routing, packet level, call level, routing weight vector, packet-by-packet WFR, call-by-call WFR, deterministically fair traffic splitting algorithm, Internet backbone traces, generalized round robin routing, adaptive multipoint path routing protocols, simulation, performance evaluation, Internet, TCP, transport protocols, packet switching, digital simulation, telecommunication network routing, telecommunication traffic, packet-switching networks, service provision, performance bounds, probabilistic routing, packet transmission |
23 | Martín Abadi, Roger M. Needham |
Prudent Engineering Practice for Cryptographic Protocols. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
23 | K. Vijayananda |
Distributed fault detection in communication protocols using extended finite state machines. |
ICPADS |
1996 |
DBLP DOI BibTeX RDF |
distributed fault detection, run-time fault detection, coding defects, memory problems, protocol faults, vocabulary faults, sequencing faults, parallel decomposition method, multiple observers, distributed fault detection mechanism, fault tolerant computing, finite state machines, transport protocols, encoding, communication protocols, fault coverage, extended finite state machines |
23 | Colin Boyd |
Towards a classification of key agreement protocols. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
one-way junctions, classification, protocols, security of data, key agreement protocols |
23 | James W. Gray III, John McLean |
Using temporal logic to specify and verify cryptographic protocols. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify |
23 | Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera |
Some Properties of Timed Token Medium Access Protocols. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
timed token medium access protocols, non-real-time traffic, worst-case values, average token rotation time, synchronous traffic, generic periodic pattern, heavy conditions, theoretical lower bounds, real networks, asynchronous overrun problem, multiple priority classes, worst-case assumptions, best-case assumptions, timed-token protocol parameters, network installation, protocols, throughput, local area network, real-time traffic, token networks, electronic messaging |
23 | Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster |
SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
network virtualization, NetFPGA |
23 | Jun-Cheol Park, Raymond E. Miller |
A Compositional Approach for Designing Multifunction Time-Dependent Protocols. |
ICNP |
1997 |
DBLP DOI BibTeX RDF |
|
23 | Hong Liu 0004, Raymond E. Miller |
Partial-Order Validation for Multi-Process Protocols Modeled as Communicating Finite State Machines. |
ICNP |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Hung-Yu Lin, Lein Harn |
Authentication Protocols for Personal Communication Systems. |
SIGCOMM |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Chandramohan A. Thekkath, Thu D. Nguyen, Evelyn Moy, Edward D. Lazowska |
Implementing Network Protocols at User Level. |
SIGCOMM |
1993 |
DBLP DOI BibTeX RDF |
TCP/IP |
23 | Teruji Shiroshita |
A Data Processing Performance Model for the OSI Application Layer Protocols. |
SIGCOMM |
1990 |
DBLP DOI BibTeX RDF |
|
23 | Thien Vo-Dai |
Implementing priorities in multiaccess protocols for optical fiber-based local area netorks. |
SIGCOMM |
1986 |
DBLP DOI BibTeX RDF |
CSMA-CD |
22 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
22 | Hoi-Sheung Wilson So, Giang Nguyen, Jean C. Walrand |
Practical synchronization techniques for multi-channel MAC. |
MobiCom |
2006 |
DBLP DOI BibTeX RDF |
recursive least squares (RLS), protocol, wireless, medium access control, time synchronization, clock drift, multi-channel MAC |
22 | Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith |
Parametric Probabilistic Routing in Sensor Networks. |
Mob. Networks Appl. |
2005 |
DBLP DOI BibTeX RDF |
simulation, sensor networks, probabilistic routing |
22 | Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith |
Parametric probabilistic sensor network routing. |
Wireless Sensor Networks and Applications |
2003 |
DBLP DOI BibTeX RDF |
simulation, sensor networks, probabilistic routing |
22 | Tatsuaki Okamoto, Kazuo Ohta |
How to Simultaneously Exchange Secrets by General Assumptions. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Joffroy Beauquier, Janna Burman, Julien Clément 0002, Shay Kutten |
On utilizing speed in networks of mobile agents. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
gathering problem, lower/upper bounds, networks of mobile agents, population protocols, cover time |
22 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
22 | Kong Ling Pang, Yang Qin |
The performance comparison of flat routing and hierarchical routing in ad hoc wireless networks in the presence of faulty nodes. |
Mobility Conference |
2007 |
DBLP DOI BibTeX RDF |
performance evaluation, ad hoc networks, wireless networks, routing protocols |
22 | Sunsook Jung, Nisar Hundewale, Alexander Zelikovsky |
GKM over large MANET. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc On-demand Distance Vector, routing load balancing, node caching, performance evaluation, mobile ad hoc networks, energy efficiency, routing protocols, network simulations |
22 | Lixin Wang, Mounir Hamdi |
HAMAC: An Adaptive Channel Access Protocol for Multimedia Wireless Networks. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
multimedia wireless networks, performance evaluation, Multiple access protocols |
22 | Jen-Yeu Chen, Gopal Pandurangan |
Optimal gossip-based aggregate computation. |
SPAA |
2010 |
DBLP DOI BibTeX RDF |
distributed randomized protocols, lower bounds, probabilistic analysis, gossip-based protocols, aggregate computation |
22 | Hossein Ghodosi, Josef Pieprzyk |
Multi-Party Computation with Omnipresent Adversary. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation |
22 | Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey |
Determining a parallel session attack on a key distribution protocol using a model checker. |
MoMM |
2008 |
DBLP DOI BibTeX RDF |
attacks on security protocols, formal analysis of security protocols, parallel session attack, model checking |
22 | Abhijit Saha, Shafqat Ur Rehman, Mikyung Kang, In-Hye Shin, Gyung-Leen Park, Junghoon Lee |
A Comparative Study of Directional Node-Disjoint Multipath Routing in Wireless Ad Hoc Network. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Unipath and Multipath Routing Protocols, Ad hoc Network, Wireless Network, Routing Protocols |
22 | Márk Jelasity, Spyros Voulgaris, Rachid Guerraoui, Anne-Marie Kermarrec, Maarten van Steen |
Gossip-based peer sampling. |
ACM Trans. Comput. Syst. |
2007 |
DBLP DOI BibTeX RDF |
peer sampling service, Gossip-based protocols, epidemic protocols |
22 | Zaichen Zhang, Victor O. K. Li |
Network-Supported Layered Multicast Transport Control for Streaming Media. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Network-Supported Protocols, Internet, Multicast, Network Protocols, Streaming Media |
22 | Nipoon Malhotra, Shrish Ranjan, Saurabh Bagchi |
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization. |
SRDS |
2005 |
DBLP DOI BibTeX RDF |
Recovery latency, Tree-based multicast protocols, Reliable multicast, Randomized protocols, Buffer utilization |
22 | Christof Fetzer |
Enforcing synchronous system properties on top of timed systems. |
PRDC |
2000 |
DBLP DOI BibTeX RDF |
synchronous system properties, synchronous system model, missed deadline, performance evaluation, performance, computational complexity, complexity, protocols, protocols, fault tolerant computing, timed systems, omission failures, dependable distributed system |
22 | Panagiotis Melas, Ed Zaluska |
Performance of Message-Passing Systems using a Zero-Copy Communication Protocol. |
IEEE PACT |
1998 |
DBLP DOI BibTeX RDF |
zero-copy protocols, BIP, communication models performance, latency, communication protocols, bandwidth, cluster of workstations, message-passing systems |
22 | Charles E. Perkins |
Mobile-IP, Ad-Hoc Networking, and Nomadicity. |
COMPSAC |
1996 |
DBLP DOI BibTeX RDF |
laptop computers, laptop computers, application interfaces, callback service, Internet, Internet, ad-hoc networking, protocols, wireless LAN, wireless communications, routing protocols, local area networks, Internet Protocol, Mobile-IP, application program interfaces, service location, feature integration, nomadicity |
22 | Yen-Min Huang, Chinya V. Ravishankar |
Designing an Agent Synthesis System for Cross-RPC Communication. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
agent synthesis system, cross-RPC communication, RPC protocols, large heterogeneous environment, RPC agents, RPC heterogeneities, agent development costs, cross-RPC performance, distributed systems, parallel programming, protocols, rapid prototyping, software prototyping, remote procedure calls, remote procedure call, telecommunications computing, transport layer, maintenance costs |
21 | Jorge Arturo Cobb, Mohamed G. Gouda |
Flow theory. |
IEEE/ACM Trans. Netw. |
1997 |
DBLP DOI BibTeX RDF |
guaranteed performance protocols, rate reservation protocols, protocols, protocol verification |
21 | Santosh S. Venkatesh |
The Science of Making ERORS: What Error Tolerance Implies for Capacity in Neural Networks. |
IEEE Trans. Knowl. Data Eng. |
1992 |
DBLP DOI BibTeX RDF |
formal protocols, error protocols, densely interconnected neural network architecture, feedforward neural network configurations, neural networks, protocols, fault tolerant computing, neural nets, associative memory, content-addressable storage, error tolerance |
21 | Bruno Ciciani, Daniel M. Dias, Philip S. Yu |
Analysis of Replication in Distributed Database Systems. |
IEEE Trans. Knowl. Data Eng. |
1990 |
DBLP DOI BibTeX RDF |
optimal replication, approximate analytical model, semi-optimistic protocols, transaction mix, distributed sites, available MIPS, performance evaluation, performance evaluation, protocols, delays, distributed databases, concurrency control, sensitivity analysis, response time, data replication, communications delay, overhead, distributed database systems, resource contention, concurrency control protocols, data contention |
21 | Shundong Li, Daoshun Wang, Yiqi Dai |
Symmetric cryptographic protocols for extended millionaires' problem. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography |
21 | Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor |
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Shankar M. Banik, Logan P. Daigle, Tao-hsiang Chang |
Implementation and empirical evaluations of floor control protocols on PlanetLab network. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
floor control protocol, performance evaluation |
Displaying result #401 - #500 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|