• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 10,584
Next 10 →

The physiology of the grid: An open grid services architecture for distributed systems integration

by Ian Foster , 2002
"... In both e-business and e-science, we often need to integrate services across distributed, heterogeneous, dynamic “virtual organizations ” formed from the disparate resources within a single enterprise and/or from external resource sharing and service provider relationships. This integration can be t ..."
Abstract - Cited by 1377 (33 self) - Add to MetaCart
be technically challenging because of the need to achieve various qualities of service when running on top of different native platforms. We present an Open Grid Services Architecture that addresses these challenges. Building on concepts and technologies from the Grid and Web services communities

On the Importance of Checking Cryptographic Protocols for Faults

by Dan Boneh, Richard A. Demillo, Richard J. Lipton , 1997
"... We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. An implementation of RSA based on the Chinese Remainder Theorem can be broken using a single erroneous s ..."
Abstract - Cited by 405 (6 self) - Add to MetaCart
We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. An implementation of RSA based on the Chinese Remainder Theorem can be broken using a single erroneous

Fading relay channels: Performance limits and space-time signal design

by Rohit U. Nabar, Helmut Bölcskei, Felix W. Kneubühler - IEEE J. SELECT. AREAS COMMUN , 2004
"... Cooperative diversity is a transmission technique where multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we examine the basic building block of cooperative diversity systems, a simple fading relay ch ..."
Abstract - Cited by 445 (4 self) - Add to MetaCart
) or decode-and-forward (DF) modes. For each protocol, we study the ergodic and outage capacity behavior (assuming Gaussian code books) under the AF and DF modes of relaying. We analyze the spatial diversity performance of the various protocols and find that full spatial diversity (second-order in this case

Study & Analysis of various Protocols in popular Web Browsers

by Dr. Bharat Mishra, Harish Singh Baghel, Manoj Patil, Pramod Singh
"... The web browsers are the application software that are used to access information from the World Wide Web. With the increas-ing popularity of the web browsers, the modern web browsers are designed to contain more features as compared to the exist-ing web browsers. For the transferring of information ..."
Abstract - Add to MetaCart
of information through these browsers, various protocols have been implemented on these modern web browsers to make these browsers more efficient. Different protocols used in different layers have different functions and by increasing the efficiency of these protocols we can make the working of browsers more

Authenticated Key Exchange Secure Against Dictionary Attacks

by Mihir Bellare, David Pointcheval, Phillip Rogaway , 2000
"... Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. While several such protocols have been suggested, the underlying theory has been laggi ..."
Abstract - Cited by 402 (35 self) - Add to MetaCart
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. While several such protocols have been suggested, the underlying theory has been

PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks

by Fan Ye, Gary Zhong, Jesse Cheng, Songwu Lu, Lixia Zhang , 2003
"... In this paper we present PEAS, a robust energyconserving protocol that can build long-lived, resilient sensor networks using a very large number of small sensors with short battery lifetime. PEAS extends the network lifetime by maintaining a necessary set of working nodes and turning o redundant one ..."
Abstract - Cited by 349 (5 self) - Add to MetaCart
In this paper we present PEAS, a robust energyconserving protocol that can build long-lived, resilient sensor networks using a very large number of small sensors with short battery lifetime. PEAS extends the network lifetime by maintaining a necessary set of working nodes and turning o redundant

Comparison on Various Protocols by using Qos Parameters in Wireless Sensor Networks 1

by Prabakar D, S. Karthikeyan
"... In recent days, the radio signals mingled with both high-quality and low-quality frequency links. The motes face failure from the radio frequency interferences in noisy environment and consume more energy for packet transmission. To overcome the higher power consumption problems, a system with the E ..."
Abstract - Add to MetaCart
with the Efficient and Reliable Routing protocol (EAR) that achieves reliable, scalable performance with minimization of redundancy routes and compromise of energy. This project describes that how to identifying good radio frequency links with minimum amount of energy utilization for data-aggregation with higher

Gossip-based ad hoc routing

by Zygmunt J. Haas, Joseph Y. Halpern, Li Li , 2002
"... Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. G ..."
Abstract - Cited by 379 (4 self) - Add to MetaCart
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols

IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks

by Fan Bai, Narayanan Sadagopan, Ahmed Helmy - IEEE INFOCOM , 2003
"... Abstract — A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Random Waypoint is the commonly used mobility mod ..."
Abstract - Cited by 299 (18 self) - Add to MetaCart
mobility models on the performance of MANET routing protocols. We propose various protocol independent metrics to capture interesting mobility characteristics, including spatial and temporal dependence and geographic restrictions. In addition, a rich set of parameterized mobility models is introduced

An Analysis of TCP Processing Overhead

by David D. Clark, Van Jacobson, John Romkey, Howard Salwen - IEEE Communications Magazine , 1989
"... networks, have been getting faster, perceived throughput at the application has not always increased accordingly. Various performance bottlenecks have been encountered, each of which has to be analyzed and corrected. One aspect of networking often suspected of contributing to low throughput is the t ..."
Abstract - Cited by 348 (0 self) - Add to MetaCart
networks, have been getting faster, perceived throughput at the application has not always increased accordingly. Various performance bottlenecks have been encountered, each of which has to be analyzed and corrected. One aspect of networking often suspected of contributing to low throughput
Next 10 →
Results 11 - 20 of 10,584
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University