Sciweavers

308 search results - page 37 / 62
» Message Protocols for Provisioning and Usage of Computing Se...
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
PERCOM
2010
ACM
13 years 6 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
GCC
2005
Springer
14 years 1 months ago
A Topology Adaptation Protocol for Structured Superpeer Overlay Construction
Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their cap...
Changyong Niu, Jian Wang, Ruimin Shen
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
14 years 1 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...