Sciweavers

2316 search results - page 91 / 464
» How Asymmetric Is the Internet
Sort
View
AH
2000
Springer
15 years 8 months ago
WAP ing the Web: Content Personalisation for WAP-Enabled Devices
Content personalisation technologies may hold the key to solving the information overload problem associated with the Internet, by facilitating the development of information servi...
Paul Cotter, Barry Smyth
CEAS
2008
Springer
15 years 6 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
SICHERHEIT
2008
15 years 5 months ago
Implications of the EU Data Retention Directive 2006/24/EC
: The strongly discussed EU Data Retention directive 2006/24/EC released in 2006 requires the operators of publicly accessible electronic communication networks to retain traffic a...
Gerald Stampfel, Wilfried N. Gansterer, Martin Ilg...
ICWS
2004
IEEE
15 years 5 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
P2P
2010
IEEE
182views Communications» more  P2P 2010»
15 years 1 months ago
Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks
Abstract--As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empir...
Seungbae Kim, Xiaofei Wang, Hyunchul Kim, Taekyoun...