Sciweavers

537 search results - page 7 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
JSS
1998
85views more  JSS 1998»
13 years 8 months ago
Comparative study and categorization of high-level petri nets
The graphical formalism of Petri Nets (PNs) is established on a strong mathematical foundation that can be applied in systems speci®cation, analysis and veri®cation. However, cl...
Vasilis C. Gerogiannis, Achilles Kameas, Panayioti...
INFOCOM
2007
IEEE
14 years 2 months ago
Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches
Abstract—Existing approaches to P2P streaming can be divided into two general classes: (i) tree-based approaches use pushbased content delivery over multiple tree-shaped overlays...
Nazanin Magharei, Reza Rejaie, Yang Guo
ICNP
2007
IEEE
14 years 2 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
PDP
2005
IEEE
14 years 2 months ago
A Comparison Study of the HLRC-DU Protocol versus a HLRC Hardware Assisted Protocol
SVM systems are a cheaper and flexible way to implement the shared memory programming paradigm. Their huge flexibility is due to their software implementation; however, this is al...
Salvador Petit, Julio Sahuquillo, Ana Pont
BMCBI
2008
112views more  BMCBI 2008»
13 years 8 months ago
A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regul
Background: Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Al...
Arnab Bhattacharya, Sasha Levy, Adria LeBoeuf, Mic...