Sciweavers

1172 search results - page 214 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
INFOCOM
2006
IEEE
14 years 1 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
CCGRID
2002
IEEE
14 years 20 days ago
Latency Performance of SOAP Implementations
Abstract— This paper presents an experimental evaluation of the latency performance of several implementations of Simple Object Access Protocol (SOAP) operating over HTTP, and co...
Dan Davis, Manish Parashar
PLDI
1999
ACM
14 years 9 hour ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
TPDS
2008
130views more  TPDS 2008»
13 years 7 months ago
NFS-CD: Write-Enabled Cooperative Caching in NFS
We present the Network File System with Cluster Delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems ...
Alexandros Batsakis, Randal C. Burns