Sciweavers

3641 search results - page 518 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
RTAS
2005
IEEE
15 years 10 months ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
DAIS
2009
15 years 5 months ago
A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation
As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that incr...
Gareth Tyson, Paul Grace, Andreas Mauthe, Gordon S...
GLOBECOM
2009
IEEE
15 years 2 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
VRST
1999
ACM
15 years 8 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven