Sciweavers

485 search results - page 57 / 97
» Edge-Based Differentiated Services
Sort
View
NORDSEC
2009
Springer
14 years 3 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
CDC
2008
IEEE
153views Control Systems» more  CDC 2008»
14 years 3 months ago
A stackelberg game for pricing uplink power in wide-band cognitive radio networks
— We study the problem of pricing uplink power in wide-band cognitive radio networks under the objective of revenue maximization for the service provider and while ensuring incen...
Ashraf Al Daoud, Tansu Alpcan, Sachin Kumar Agarwa...
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 2 months ago
Earning a Living among Peers - the Quest for viable P2P Revenue Models
P2P applications have found a lot of interest lately but there are open questions about the viability of the revenue models behind P2P applications/ services. In this paper, we di...
Thomas Hummel, Øyvind Strømme, Ryan ...
ARTQOS
2003
Springer
14 years 2 months ago
An IP QoS Architecture for 4G Networks
: This paper describes an architecture for differentiation of Quality of Service in heterogeneous wireless-wired networks. This architecture applies an “all-IP” paradigm, with ...
Janusz Gozdecki, Piotr Pacyna, Victor Marques, Rui...
ESORICS
2006
Springer
14 years 12 days ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter