Sciweavers

8772 search results - page 1686 / 1755
» Business Services Networks
Sort
View
CN
2007
115views more  CN 2007»
13 years 10 months ago
Parallel overlays for high data-rate multicast data transfer
Recently a number of application-layer multicast (ALM) protocols have been proposed as a promising alternative to deploying multicast services in the unicast-only Internet. Curren...
Ka Ki To, Jack Y. B. Lee
IJSTM
2006
63views more  IJSTM 2006»
13 years 10 months ago
Electronic procurement applications and their impact on supplier relationship management
: The emergence of new electronic procurement applications and the rise of existing ones to their full potential have been revolutionising the disciplines of procurement and suppli...
Stephan M. Wagner, Michael Essig
JCS
2008
88views more  JCS 2008»
13 years 10 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JSA
2008
81views more  JSA 2008»
13 years 10 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
JCSS
2006
102views more  JCSS 2006»
13 years 10 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
« Prev « First page 1686 / 1755 Last » Next »