Sciweavers

849 search results - page 163 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
TDSC
2010
160views more  TDSC 2010»
13 years 2 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
BMCBI
2005
94views more  BMCBI 2005»
13 years 7 months ago
Computational identification of strain-, species- and genus-specific proteins
Background: The identification of unique proteins at different taxonomic levels has both scientific and practical value. Strain-, species- and genus-specific proteins can provide ...
Raja Mazumder, Darren A. Natale, Sudhir Murthy, Ra...
GRID
2005
Springer
14 years 1 months ago
Toward seamless grid data access: design and implementation of GridFTP on .NET
— To date, only Linux-/UNIX-based hosts have been participants in the Grid vision for seamless data access, because the necessary Grid data access protocols have not been impleme...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...