Sciweavers

2904 search results - page 510 / 581
» Internet Infrastructure Security
Sort
View
CMS
2010
149views Communications» more  CMS 2010»
13 years 9 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
CN
2010
120views more  CN 2010»
13 years 9 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
CCR
2006
110views more  CCR 2006»
13 years 9 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...
ADHOC
2005
176views more  ADHOC 2005»
13 years 9 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
IMC
2010
ACM
13 years 7 months ago
CloudCmp: comparing public cloud providers
While many public cloud providers offer pay-as-you-go computing, their varying approaches to infrastructure, virtualization, and software services lead to a problem of plenty. To ...
Ang Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang