Sciweavers

675 search results - page 84 / 135
» Anonymous communication in overlay networks
Sort
View
GLOBECOM
2010
IEEE
13 years 9 months ago
Admission Control and Channel Allocation for Supporting Real-Time Applications in Cognitive Radio Networks
Abstract--Proper admission control in cognitive radio networks is critical in providing QoS guarantees to secondary unlicensed users. In this paper, we study the admission control ...
Feng Wang, Junhua Zhu, Jianwei Huang, Yuping Zhao
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 5 months ago
VoIP Performance in SIP-Based Vertical Handovers Between WLAN and GPRS/UMTS Networks
—This paper experimentally analyzes the handover performance of VoIP sessions in a wireless overlay of 802.11 WLANs and GPRS/UMTS networks when mobility is handled at the applica...
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, Mar...
ICCNMC
2005
Springer
14 years 4 months ago
Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks
This paper proposes a set of novel multicast algorithms for m-D mesh overlay networks that can achieve shorter multicast delay and less resource consumptions. In contrast to previo...
Weijia Jia, Wanqing Tu, Jie Wu
INFOCOM
2009
IEEE
14 years 5 months ago
Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P Search
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...
Stratis Ioannidis, Peter Marbach
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 4 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...