Sciweavers

785 search results - page 107 / 157
» Cache Behavior of Network Protocols
Sort
View
ICNP
2009
IEEE
13 years 5 months ago
Quality of Name Resolution in the Domain Name System
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. I...
Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Kri...
INFOCOM
2009
IEEE
14 years 2 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
CN
2004
142views more  CN 2004»
13 years 7 months ago
Adaptive video streaming: pre-encoded MPEG-4 with bandwidth scaling
The increasing popularity of streaming video is a cause for concern for the stability of the Internet because most streaming video content is currently delivered via UDP, without ...
Alex Balk, Mario Gerla, Dario Maggiorini, M. Y. Sa...
MOBIDE
1999
ACM
13 years 12 months ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham
AINA
2007
IEEE
13 years 11 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park