Sciweavers

8772 search results - page 1597 / 1755
» Business Services Networks
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
IJISEC
2007
119views more  IJISEC 2007»
13 years 10 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
JCIT
2007
190views more  JCIT 2007»
13 years 10 months ago
A Two-layer Super-Peer based P2P Live Media Streaming System
Peer-to-peer (P2P) file sharing has become increasingly popular, accounting for as much as 70% of Internet traffic by some estimates. Recently, we have been witnessing the emergen...
Poo Kuan Hoong, Hiroshi Matsuo
JNW
2007
107views more  JNW 2007»
13 years 10 months ago
Evaluating Performance Characteristics of SIP over IPv6
— Due to the ongoing massive growth of the global Internet, the rising integration of Voice over IP (VoIP) services and the Fixed Mobile Convergence (FMC), the IPv6 protocol and ...
Thomas Hoeher, Martin Petraschek, Slobodanka Tomic...
CCR
1999
92views more  CCR 1999»
13 years 10 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
« Prev « First page 1597 / 1755 Last » Next »