Sciweavers

2562 search results - page 301 / 513
» An Internet without the Internet protocol
Sort
View
247
Voted
TELSYS
2010
147views more  TELSYS 2010»
14 years 10 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
112
Voted
ICIP
2003
IEEE
16 years 5 months ago
Rate-distortion optimized interactive browsing of JPEG2000 images
This paper is concerned with remote browsing of JPEG2000 compressed imagery. A potentially interactive client identifies a region and maximum resolution of interest. The server re...
David Taubman, René Rosenbaum
176
Voted

Publication
243views
16 years 2 months ago
A Java-based Wrapper for Wireless Communications
The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications hav...
Alessandro Genco, Antonio Gentile, Cono Ferrarotto...
128
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
106
Voted
ICAS
2009
IEEE
184views Robotics» more  ICAS 2009»
15 years 10 months ago
Open IMS Core with VoIP Quality Adaptation
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...
Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiy...