Sciweavers

99 search results - page 16 / 20
» Middle-aged users' experience of short message service
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 5 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
WWW
2008
ACM
14 years 8 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
MUE
2008
IEEE
84views Multimedia» more  MUE 2008»
14 years 2 months ago
TCP-Based Dynamic Media Stream Adaptation in Ubiquitous Environment
More and more media material is consumed in ubiquitous environment where the service can be experienced over different devices, network conditions, network bearers, etc. Unlike in...
Gergely Hományi, Gábor Paller