Search

Your search keyword '"COMPUTER network protocols"' showing total 416 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal ieee transactions on parallel & distributed systems Remove constraint Journal: ieee transactions on parallel & distributed systems
416 results on '"COMPUTER network protocols"'

Search Results

1. Low-Cost Datacenter Load Balancing With Multipath Transport and Top-of-Rack Switches.

2. Exact Distributed Load Centrality Computation: Algorithms, Convergence, and Applications to Distance Vector Routing.

3. Towards Stable Flow Scheduling in Data Centers.

4. TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures.

5. Response-Time Analysis in Hierarchically-Scheduled Time-Partitioned Distributed Systems.

6. Leader Set Selection for Low-Latency Geo-Replicated State Machine.

7. Toward an Optimal Online Checkpoint Solution under a Two-Level HPC Checkpoint Model.

8. Chasing the Optimum in Replicated In-Memory Transactional Platforms via Protocol Adaptation.

9. Throughput and Delay in Heterogeneous Cognitive Radio Networks with Cooperative Secondary Users.

10. Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems.

11. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design.

12. BlindDate: A Neighbor Discovery Protocol.

13. VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments.

14. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.

15. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.

16. LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks.

17. Incorporating Energy Heterogeneity into Sensor Network Time Synchronization.

18. Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks.

19. Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems.

20. Thread Progress Aware Coherence Adaption for Hybrid Cache Coherence Protocols.

21. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.

22. Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach.

23. Guarantee Strict Fairness and UtilizePrediction Better in Parallel Job Scheduling.

24. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

25. Time Synchronization Based on Slow-Flooding in Wireless Sensor Networks.

26. On the Feasibility of Gradient-Based Data-Centric Routing Using Bloom Filters.

27. Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.

28. Scaling Up Publish/Subscribe Overlays Using Interest Correlation for Link Sharing.

29. Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties.

30. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity.

31. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems.

32. A Fast RPC System for Virtual Machines.

33. ASAP: Scalable Collision Arbitration for Large RFID Systems.

34. Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering.

35. Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models.

36. Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks.

37. DCNS: An Adaptable High Throughput RFID Reader-to-Reader Anticollision Protocol.

38. Exploiting Concurrency for Efficient Dissemination in Wireless Sensor Networks.

39. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

40. Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks.

41. Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs.

42. Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications.

43. Service Provision Control in Federated Service Providing Systems.

44. Adaptive-Tree Multicast: Efficient Multidestination Support for CMP Communication Substrate.

45. Maintaining Data Consistency in Structured P2P Systems.

46. Efficient Misplaced-Tag Pinpointing in Large RFID Systems.

47. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.

48. A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition.

49. X-BOT: A Protocol for Resilient Optimization of Unstructured Overlay Networks.

50. Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks.

Catalog

Books, media, physical & digital resources