Sciweavers

279 search results - page 41 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
ICC
2007
IEEE
14 years 2 months ago
Towards Sender-Based TFRC
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
HT
2009
ACM
14 years 2 months ago
Sixearch.org 2.0 peer application for collaborative web search
Sixearch.org is a peer application for social, distributed, adaptive Web search, which integrates the Sixearch.org protocol, a topical crawler, a document indexing system, a retri...
Namrata Lele, Le-Shin Wu, Ruj Akavipat, Filippo Me...
CODASPY
2012
12 years 3 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
WWW
2004
ACM
14 years 8 months ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong
EUROSYS
2009
ACM
14 years 5 months ago
Dingo: taming device drivers
Device drivers are notorious for being a major source of failure in operating systems. In analysing a sample of real defects in Linux drivers, we found that a large proportion (39...
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heise...