Sciweavers

2699 search results - page 483 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
COMCOM
2007
111views more  COMCOM 2007»
13 years 7 months ago
Failover, load sharing and server architecture in SIP telephony
We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively new IP telephony context. The paper compares various...
Kundan Singh, Henning Schulzrinne
KAIS
2008
151views more  KAIS 2008»
13 years 7 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
ENTCS
2007
95views more  ENTCS 2007»
13 years 7 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
JUCS
2006
77views more  JUCS 2006»
13 years 7 months ago
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
: More than 60,000 people die suddenly each year in France due to cardiac arrhythmias. The current techniques used to diagnose cardiac arrhythmias such as HOLTER, R.TEST and teleme...
Haiying Zhou, Kun Mean Hou, Laurent Gineste, Chris...
JNW
2007
135views more  JNW 2007»
13 years 7 months ago
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks
Abstract— The major trend in next-generation or 4G wireless networks (NGWN/4G) is the coexistence of diverse but complementary architectures and wireless access technologies. In ...
Christian Makaya, Samuel Pierre