Sciweavers

1506 search results - page 208 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 8 months ago
Peer-to-Peer Communication Across Network Address Translators
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP addre...
Bryan Ford, Pyda Srisuresh, Dan Kegel
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
14 years 9 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
14 years 10 months ago
GADT: A Probability Space ADT for Representing and Querying the Physical World
Large sensor networks are being widely deployed for measurement, detection, and monitoring applications. Many of these applications involve database systems to store and process d...
Anton Faradjian, Johannes Gehrke, Philippe Bonnet
ICDCSW
2006
IEEE
14 years 2 months ago
Revisiting Content-Based Publish/Subscribe
Content-based publish/subscribe is a very appealing interaction model that has attracted intense efforts from the research community in the quest to obtain “Internet-wide” sca...
Costin Raiciu, David S. Rosenblum, Mark Handley
JNW
2007
102views more  JNW 2007»
13 years 8 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal