Sciweavers

2335 search results - page 426 / 467
» A Lightweight Sensor Network Management System Design
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
MOBICOM
2003
ACM
14 years 28 days ago
A comparison of mechanisms for improving mobile IP handoff latency for end-to-end TCP
Handoff latency results in packet losses and severe End-to-End TCP performance degradation as TCP, perceiving these losses as congestion, causes source throttling or retransmissio...
Robert Hsieh, Aruna Seneviratne
ICPADS
2008
IEEE
14 years 2 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
COMPSAC
2005
IEEE
14 years 1 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
NETGAMES
2005
ACM
14 years 1 months ago
A challenge for reusing multiplayer online games without modifying binaries
In this paper, we advocate the problem of reusing Multiplayer Online Game (MOG) in Client-Server (C/S) architecture. The problem is that MOG services cannot continue to be provide...
Yugo Kaneda, Hitomi Takahashi, Masato Saito, Hirot...