Sciweavers

3972 search results - page 220 / 795
» Design of the iSCSI Protocol
Sort
View
WS
2006
ACM
15 years 10 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Seamless channel transition for pyramid-based near-VoD services
Periodic broadcasting is known as an efficient technique for delivering popular videos by reducing bandwidth requirement for transmitting streaming video to simultaneous viewers. ...
Wei-De Chien, Kai-Chao Yang, Jia-Shung Wang
INFOCOM
2005
IEEE
15 years 10 months ago
A disconnection-tolerant transport for drive-thru Internet environments
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Jörg Ott, Dirk Kutscher
IPTPS
2004
Springer
15 years 10 months ago
On Transport Layer Support for Peer-to-Peer Networks
TCP is the transport protocol used predominantly in the Internet as well as in peer-to-peer networks. However, peerto-peer networks exhibit very different characteristics from tho...
Hung-Yun Hsieh, Raghupathy Sivakumar
IUI
2000
ACM
15 years 9 months ago
More than just a pretty face: affordances of embodiment
Prior research into embodied interface agents has found that users like them and find them engaging. In this paper, we argue that embodiment can serve an even stronger function if...
Justine Cassell, Timothy W. Bickmore, Hannes H&oum...