Sciweavers

2904 search results - page 57 / 581
» Internet Infrastructure Security
Sort
View
PDP
2008
IEEE
14 years 4 months ago
Internet-Scale Simulations of a Peer Selection Algorithm
The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems ar...
Ali Boudani, Yiping Chen, Gilles Straub, Gwendal S...
CCR
2005
88views more  CCR 2005»
13 years 9 months ago
DIMES: let the internet measure itself
Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIM...
Yuval Shavitt, Eran Shir
TNC
2004
96views Education» more  TNC 2004»
13 years 11 months ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
ICDE
1999
IEEE
103views Database» more  ICDE 1999»
14 years 11 months ago
Using Java and CORBA for Implementing Internet Databases
We describe an architecture called WebFINDIT that allows dynamic couplings of Web accessible databases based on tlleir content and interest. We propose an implementation using WWW...
Athman Bouguettaya, Boualem Benatallah, Mourad Ouz...
PERCOM
2010
ACM
13 years 8 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...