Spelling suggestions: "subject:"screeningverfahren""
11 |
Equation based congestion control for unicast and multicast data streamsWidmer, Jörg. January 2003 (has links) (PDF)
Mannheim, Univ., Diss., 2003.
|
12 |
Skalierbare und zuverlässige Gruppenkommunikation im InternetMaihöfer, Christian. January 2002 (has links)
Stuttgart, Univ., Diss., 2002.
|
13 |
SANGRIA Secure ANonymous GRoup InfrAstructure /Weiler, Nathalie. January 2002 (has links)
Diss. no. 14770 techn. sc. SFIT Zurich. / Im Buchh.: Aachen : Shaker-Verlag. Literaturverz.
|
14 |
Parallele Bildberechnung in einem Netzwerk von WorkstationsRoth, Marcus. Unknown Date (has links)
Techn. Universiẗat, Diss., 2005--Darmstadt.
|
15 |
Consistency algorithms and protocols for distributed interactive applicationsVogel, Jürgen. Unknown Date (has links) (PDF)
University, Diss., 2004--Mannheim.
|
16 |
DIVE - ein internet-basiertes Virtual-Reality-System für viele NutzerZiegler, Stefan 02 July 2003 (has links)
Workshop Mensch-Computer-Vernetzung
- basierend auf Multicast
- 3D-Welten werden im Fenster dargestellt
- mehrere Nutzer bewegen sich in einer Welt
|
17 |
Communication Overhead of Network Coding Schemes Secure against Pollution AttacksFranz, Elke, Pfennig, Stefan, Fischer, André 01 August 2012 (has links) (PDF)
Network coding is a promising approach for increasing performance of multicast data transmission and reducing energy costs. Of course, it is essential to consider security aspects to ensure a reliable data transmission. Particularly, pollution attacks may have serious impacts in network coding since a single attacker can jam large parts of the network. Therefore, various approaches have been introduced to secure network coding against this type of attack.
However, introducing security increases costs. Even though there are some performance analysis of secure schemes, to our knowledge there are no details whether these schemes are worthwhile to replace routing under the facet of efficiency. Thus, we discuss in this report parameters to assess the efficiency of secure network coding schemes. Using three network graphs, we evaluate parameters focusing on communication overhead for selected schemes. Our results show that there are still benefits in comparison to routing depending on the network topology.
|
18 |
Sicherheitsarchitektur für die Verteilung skalierbar codierter Bildsequenzen an heterogene mobile TeilnehmerDunte, Markus January 2009 (has links)
Zugl.: Siegen, Univ., Diss., 2009
|
19 |
Video multicast in peer-to-peer networksAsís López Fuentes, Francisco de January 2009 (has links)
Zugl.: München, Techn. Univ., Diss., 2009
|
20 |
Architecture and access protocol for a wavelength selective single hop packet switched metropolitan area networkMaier, Martin. Unknown Date (has links) (PDF)
Techn. University, Diss., 2003--Berlin.
|
Page generated in 0.0808 seconds