Sciweavers

5324 search results - page 941 / 1065
» Internet Security Protocols
Sort
View
PAM
2005
Springer
14 years 1 months ago
Scalable Coordination Techniques for Distributed Network Monitoring
Abstract. Emerging network monitoring infrastructures capture packetlevel traces or keep per-flow statistics at a set of distributed vantage points. Today, distributed monitors in...
Manish R. Sharma, John W. Byers
IMC
2004
ACM
14 years 1 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
14 years 1 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
ESWS
2004
Springer
14 years 1 months ago
Approaches to Semantic Web Services: an Overview and Comparisons
The next Web generation promises to deliver Semantic Web Services (SWS); services that are self-described and amenable to automated discovery, composition and invocation. A prerequ...
Liliana Cabral, John Domingue, Enrico Motta, Terry...