Sciweavers

4435 search results - page 32 / 887
» Networking named content
Sort
View
INFOSCALE
2006
ACM
14 years 3 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
INFOCOM
2009
IEEE
14 years 4 months ago
On the Effectiveness of Measurement Reuse for Performance-Based Detouring
— For both technological and economic reasons, the default path between two end systems in the wide-area Internet can be suboptimal. This observation has motivated a number of sy...
David R. Choffnes, Fabian E. Bustamante
ICOIN
2001
Springer
14 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
KBSE
2000
IEEE
14 years 2 months ago
Exploring the Design of an Intentional Naming Scheme with an Automatic Constraint Analyzer
Lightweight formal modeling and automatic analysis were used to explore the design of the Intentional Naming System (INS), a new scheme for resource discovery in a dynamic network...
Sarfraz Khurshid, Daniel Jackson
PAA
2006
13 years 9 months ago
Automatic name extraction from degraded document images
The problem addressed in this paper is the automatic extraction of names from a document image. Our approach relies on the combination of two complementary analyses. First, the ima...
Laurence Likforman-Sulem, Pascal Vaillant, Aliette...