Sciweavers

5324 search results - page 746 / 1065
» Internet Security Protocols
Sort
View
TPDS
2008
231views more  TPDS 2008»
13 years 11 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
COMCOM
2002
68views more  COMCOM 2002»
13 years 10 months ago
A performance study of RSVP with proposed extensions
Resource ReSerVation Protocol (RSVP) was developed as an intended key component for the evolving Internet, and in particular for the Integrated Services architecture. Therefore, R...
Laurent Mathy, David Hutchison, Stefan Schmid, Ste...
TON
1998
107views more  TON 1998»
13 years 10 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
ICMCS
2010
IEEE
154views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Minimizing delay in lossless sequential data streaming
There is an ongoing explosion of interactive Internet applications. By nature, these applications require responsive clientserver data exchange and lossless, in-order delivery. In...
Sanjeev Mehrotra, Jin Li, Ying-zong Huang
IPPS
2010
IEEE
13 years 9 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...