Sciweavers

2162 search results - page 391 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ICC
2008
IEEE
168views Communications» more  ICC 2008»
14 years 4 months ago
A Balanced Tree-Based Strategy for Unstructured Media Distribution in P2P Networks
—Most research on P2P multimedia streaming assumes that users access video content sequentially and passively. Unlike P2P live streaming in which the peers start playback from th...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, A...
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 4 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
ICCCN
2008
IEEE
14 years 4 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
ICDCS
2008
IEEE
14 years 4 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
ICSM
2008
IEEE
14 years 4 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos