Sciweavers

5324 search results - page 904 / 1065
» Internet Security Protocols
Sort
View
ICWS
2004
IEEE
13 years 10 months ago
WSIP - Web Service SIP Endpoint for Converged Multimedia/Multimodal Communication over IP
We present an approach for converged communication services over IP, based on the concept of WSIP (Web Service SIP). In our approach, each WSIP node is both a SIP endpoint that co...
Feng Liu, Wu Chou, Li Li, J. Jenny Li
TELSYS
2002
128views more  TELSYS 2002»
13 years 8 months ago
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: singlesource, shortest-path trees and shared, core-based trees. Core-based multicas...
Daniel Zappala, Aaron Fabbri, Virginia Mary Lo
PE
2010
Springer
212views Optimization» more  PE 2010»
13 years 3 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
ESWS
2011
Springer
13 years 20 days ago
DataFinland - A Semantic Portal for Open and Linked Datasets
The number of open datasets available on the web is increasing rapidly with the rise of the Linked Open Data (LOD) cloud and various governmental efforts for releasing public data ...
Matias Frosterus, Eero Hyvönen, Joonas Laitio
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...