Search

Your search keyword '"COMPUTER network protocols"' showing total 99 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers
99 results on '"COMPUTER network protocols"'

Search Results

1. Network Synthesis for Distributed Embedded Systems.

2. Towards Optimal Multi-Level Checkpointing.

3. Bounded Auditable Restoration of Distributed Systems.

4. Deadlock Verification of Cache Coherence Protocols and Communication Fabrics.

5. ID2S Password-Authenticated Key Exchange Protocols.

6. A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.

7. User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.

8. Resource-Efficient Byzantine Fault Tolerance.

9. Designing and Modeling of Covert Channels in Operating Systems.

10. Secure Cloud Storage Meets with Secure Network Coding.

11. On Open Nesting in Distributed Transactional Memory.

12. Focus and Shoot: Exploring Auto-Focus in RFID Tag Identification Towards a Specified Area.

13. Software Defined Monitoring of Application Protocols.

14. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

15. Supporting System Consistency with Differential Transactions in Flash-Based SSDs.

16. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.

17. Towards Energy Efficient Duty-Cycled Networks: Analysis, Implications and Improvement.

18. Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.

19. Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags.

20. Methodology for Cycle-Accurate DRAM Performance Analysis.

21. Fault Attacks on Pairing-Based Protocols Revisited.

22. Optimization of Latency Insensitive Systems Through Back Pressure Minimization.

23. Hardware–Software Coherence Protocol for the Coexistence of Caches and Local Memories.

24. PC-DUOS+: A TCAM Architecture for Packet Classifiers.

25. Testbench Qualification of SystemC TLM Protocols through Mutation Analysis.

26. Algorithmic Mechanisms for Reliable Master-Worker Internet-Based Computing.

27. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications.

28. ATP: A Microprotocol Approach to Autonomic Communication.

29. Receiving Buffer Adaptation for High-Speed Data Transfer.

30. A Lightweight and Cooperative Multifactor Considered File Replication Method in Structured P2P Systems.

31. Real-Time Query Scheduling for Wireless Sensor Networks.

32. Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.

33. On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.

34. ReCREW: A Reliable Flash-Dissemination System.

35. Increasing the Effectiveness of Directory Caches by Avoiding the Tracking of Noncoherent Memory Blocks.

36. Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel.

37. SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks.

38. Importance of Coherence Protocols with Network Applications on Multicore Processors.

39. Subspace Snooping: Exploiting Temporal Sharing Stability for Snoop Reduction.

40. Content Discovery and Caching in Mobile Networks with Infrastructure.

41. Toward Adaptive Sleep Schedules for Balancing Energy Consumption in Wireless Sensor Networks.

42. Access Time Analysis for IEEE P1687.

43. Improving Flash Wear-Leveling by Proactively Moving Static Data.

44. Slicing Distributed Systems.

45. An Efficient Byzantine-Resilient Tuple Space.

46. Diversity Combining ARQ over the m(≥ 2)-ary Unidirectional Channel.

47. Routing in Outer Space: Fair Traffic Load in Multihop Wireless Networks.

48. An Efficient Directed Localization Recursion Protocol for Wireless Sensor Networks.

49. Shortest Path Tree Computation in Dynamic Graphs.

50. Ordered Round-Robin: An Efficient Sequence Preserving Packet Scheduler.

Catalog

Books, media, physical & digital resources