Sciweavers

1000 search results - page 79 / 200
» Application Access Control at Network Level
Sort
View
INFOCOM
2000
IEEE
14 years 2 days ago
Admission Control Based on End-to-End Measurements
— This paper proposes a controlled-load service that provides a network state with bounded and well known worst-case behavior. The service is primarily developed for real-time ap...
Viktória Elek, Gunnar Karlsson, Robert R&ou...
ICCCN
2008
IEEE
14 years 2 months ago
Bandwidth Consumption Control and Service Differentiation for Video Streaming
—Multimedia streaming is resource demanding. It may starve other applications such as file transfer sharing the network, for example, in a smart home. To address the problem, we...
Can Basaran, Kyoung-Don Kang, Mehmet H. Suzer, Ki-...
NCA
2005
IEEE
14 years 1 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan
ICNS
2007
IEEE
14 years 2 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...