Sciweavers

8772 search results - page 1703 / 1755
» Business Services Networks
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Delay Tolerant Collaborations among Campus-Wide Wireless Users
Abstract—The ubiquitous deployment of wireless LAN networks are allowing students to embrace laptops as their preferred computing platform. We investigated the viability of build...
Xuwen Yu, Surendar Chandra
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 3 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
ACSAC
2007
IEEE
14 years 3 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 3 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
LCN
2007
IEEE
14 years 3 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
« Prev « First page 1703 / 1755 Last » Next »