Sciweavers

2200 search results - page 165 / 440
» Hop Integrity in Computer Networks
Sort
View
128
Voted
CA
1998
IEEE
15 years 7 months ago
Efficient Network Transmission of Virtual Human Bodies
Integrating virtual human's animation in networked virtual environments (NVEs) has the potential to create severe network load issues. In NVEs, users are represented by their...
Tolga K. Capin, Maja Jovovic, Joaquim Esmerado, Am...
123
Voted
PERCOM
2006
ACM
16 years 2 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
129
Voted
TRUST
2009
Springer
15 years 9 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
114
Voted
HPDC
1997
IEEE
15 years 6 months ago
A Secure Communications Infrastructure for High-Performance Distributed Computing
We describe a software infrastructure designed to support the development of applications that use high-speed networks to connect geographically distributed supercomputers, databa...
Ian T. Foster, Nicholas T. Karonis, Carl Kesselman...
148
Voted
PERCOM
2003
ACM
16 years 2 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni