Sciweavers

849 search results - page 158 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
JECR
2000
114views more  JECR 2000»
13 years 7 months ago
Intelligent Agents Acting as Artificial Employees in an Electronic Market
This paper describes an agent-based electronic market system whose underlying communication and cooperation protocols establish an artificial environment with advanced features. U...
Nikos I. Karacapilidis, Pavlos Moraitis
ADHOCNETS
2009
Springer
13 years 5 months ago
Compressing MAC Headers on Shared Wireless Media
This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes coul...
Jesus Arango, Matthew Faulkner, Stephen Pink
USENIX
2003
13 years 9 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
MOBIHOC
2004
ACM
14 years 29 days ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
WWW
2004
ACM
14 years 8 months ago
The interoperability of learning object repositories and services: standards, implementations and lessons learned
Interoperability is one of the main issues in creating a networked system of repositories. The eduSource project in its holistic approach to building a network of learning object ...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...