• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 19,969
Next 10 →

Protocol Service Decomposition for High-Performance Networking

by Chris Maeda, Brian N. Bershad - In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles , 1993
"... In this paper we describe a new approach to implementing network protocols that enables them to have high performance and high flexibility, while retaining complete conformity to existing application programming interfaces. The key insight behind our work is that an application's interface to t ..."
Abstract - Cited by 156 (10 self) - Add to MetaCart
In this paper we describe a new approach to implementing network protocols that enables them to have high performance and high flexibility, while retaining complete conformity to existing application programming interfaces. The key insight behind our work is that an application's interface

AD-A270 613 Protocol Service Decomposition for High-Performance Networking

by Chris Maeda, Brian N. Bershad , 1993
"... h- Z.s bes:cp ov ..."
Abstract - Add to MetaCart
h- Z.s bes:cp ov

The Deisgn Philosophy of the DARPA Internet Protocols

by David D. Clark - In ACM SIGCOMM , 1988
"... The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work, it i ..."
Abstract - Cited by 551 (2 self) - Add to MetaCart
, it is sometimes difficult to deduce from these why the protocol is as it is. For example, the Intemet protocol is based on a connectionless ordatagram mode of service. The motivation for this has been greatly misunderstood. This paper attempts to capture some of the early reasoning which shaped the Intemet

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments

Grid Information Services for Distributed Resource Sharing

by Karl Czajkowski , Steven Fitzgerald, Ian Foster, Carl Kesselman , 2001
"... Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions: what are sometimes called virtual organizations. In these settings, the discovery, characterization, and monitoring of resources, services, and computations are challengi ..."
Abstract - Cited by 712 (52 self) - Add to MetaCart
and monitoring, and hence for planning and adapting application behavior. We present here an information services architecture that addresses performance, security, scalability, and robustness requirements. Our architecture defines simple low-level enquiry and registration protocols that make it easy

The flooding time synchronization protocol

by Miklos Maroti, Branislav Kusy, Gyula Simon, Akos Ledeczi , 2004
"... Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. This paper introduces the robust Flooding Time Synchronization Protocol (FTSP), especially tailored for applications requir ..."
Abstract - Cited by 469 (16 self) - Add to MetaCart
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. This paper introduces the robust Flooding Time Synchronization Protocol (FTSP), especially tailored for applications

Integrated services in the internet architecture: an overview (RFC

by Group R. Braden, S. Shenker, Scott Shenker, Lixia Zhang, Deborah Estrin, Sugih Jamin , 1633
"... This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real-ti ..."
Abstract - Cited by 737 (24 self) - Add to MetaCart
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real

Kerberos: An Authentication Service for Open Network Systems

by Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - IN USENIX CONFERENCE PROCEEDINGS , 1988
"... In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users’ identities. This paper gives an overview of the Kerb ..."
Abstract - Cited by 687 (12 self) - Add to MetaCart
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users’ identities. This paper gives an overview

Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial

by Fred B. Schneider - ACM COMPUTING SURVEYS , 1990
"... The state machine approach is a general method for implementing fault-tolerant services in distributed systems. This paper reviews the approach and describes protocols for two different failure models--Byzantine and fail-stop. System reconfiguration techniques for removing faulty components and i ..."
Abstract - Cited by 975 (9 self) - Add to MetaCart
The state machine approach is a general method for implementing fault-tolerant services in distributed systems. This paper reviews the approach and describes protocols for two different failure models--Byzantine and fail-stop. System reconfiguration techniques for removing faulty components

Ariadne: a secure on-demand routing protocol for ad hoc networks," in

by Yih-Chun Hu , Adrian Perrig , David B Johnson - Proc. 8th ACM International Conf. Mobile Computing Networking , , 2002
"... Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing prob ..."
Abstract - Cited by 925 (12 self) - Add to MetaCart
problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers
Next 10 →
Results 1 - 10 of 19,969
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University