Results 1 - 10
of
642
Key Management for Multicast: Issues and Architectures
, 1998
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. This report contains a discussion of the difficult problem of key ..."
Abstract
-
Cited by 303 (1 self)
- Add to MetaCart
.g., periodic rekey). In particular, this report identifies a technique which allows for secure compromise recovery, while also being robust against collusion of excluded users. This is one important feature of multicast key management
Trading structure for randomness in wireless opportunistic routing
, 2007
"... Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers ’ access to the medium. Although the scheduler delivers opportunistic gain ..."
Abstract
-
Cited by 296 (7 self)
- Add to MetaCart
gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast. This paper
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes
- IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
, 2005
"... Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they ..."
Abstract
-
Cited by 302 (1 self)
- Add to MetaCart
they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. These P2P networks try to provide a long list of features such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence
Routing in Overlay Multicast Networks
, 2000
"... Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated features, and can provide multicast services, where no network layer support is available. Overlay multicast networks offer ..."
Abstract
-
Cited by 122 (3 self)
- Add to MetaCart
Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated features, and can provide multicast services, where no network layer support is available. Overlay multicast networks
Flooding for reliable multicast in multi-hop ad hoc networks
- in Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
, 1999
"... Abstract Ad Hoc Networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the universal mobility of all hosts. This requires re-engineering of basic network services including reliable mul ..."
Abstract
-
Cited by 176 (0 self)
- Add to MetaCart
Abstract Ad Hoc Networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the universal mobility of all hosts. This requires re-engineering of basic network services including reliable
Multimedia dataembedding and watermarking technologies
- Proceedings of the IEEE
, 1998
"... In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible ..."
Abstract
-
Cited by 231 (2 self)
- Add to MetaCart
inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services
Pond: the OceanStore Prototype
, 2003
"... OceanStore is an Internet-scale, persistent data store designed for incremental scalability, secure sharing, and long-term durability. Pond is the OceanStore prototype; it contains many of the features of a complete system including location-independent routing, Byzantine update commitment, push-bas ..."
Abstract
-
Cited by 222 (18 self)
- Add to MetaCart
OceanStore is an Internet-scale, persistent data store designed for incremental scalability, secure sharing, and long-term durability. Pond is the OceanStore prototype; it contains many of the features of a complete system including location-independent routing, Byzantine update commitment, push
Spatiotemporal Multicast in Sensor Networks
- IN SENSYS
, 2003
"... Sensor networks often involve the monitoring of mobile phenomena, which can be facilitated by a spatiotemporal multicast protocol we call "mobicast". Mobicast is a novel spatiotemporal multicast protocol featuring a delivery zone that evolves over time. Mobicast can in theory provide ab ..."
Abstract
-
Cited by 65 (7 self)
- Add to MetaCart
Sensor networks often involve the monitoring of mobile phenomena, which can be facilitated by a spatiotemporal multicast protocol we call "mobicast". Mobicast is a novel spatiotemporal multicast protocol featuring a delivery zone that evolves over time. Mobicast can in theory provide
Multicast Transport Protocols: A Survey and Taxonomy
- IEEE Communications Magazine
, 1998
"... Network support for multicast has triggered the development of group communication applications such as multipoint data dissemination and multi-party conferencing tools. To support these applications, several multicast transport protocols have been proposed and implemented. Multicast transport proto ..."
Abstract
-
Cited by 84 (0 self)
- Add to MetaCart
features, discusses the rationale behind the protocol's design decisions, and presents some current research issues in multicast protocol design. 1 Introduction Multicast transport mechanisms have been a topic of intense research and development efforts over the past couple of years. Both
Channeled Multicast For Group Communications
, 2001
"... Multi-agent systems can benefit from the possibility of broadcasting messages to a wide audience. The audience may include overhearing agents which, unknown to senders, observe conversations and, among other things, pro-actively send suggestions. Current mainstream agent communication languages howe ..."
Abstract
-
Cited by 40 (13 self)
- Add to MetaCart
however lack adequate support for broadcasting. This paper defines the requirements for a form of broadcast that we call channeled multicast, whose distinguishing features include the ability to distinguish streams of messages by their theme, and to address agents by their characteristics. We present
Results 1 - 10
of
642