Sciweavers

347 search results - page 47 / 70
» On private computation in incomplete networks
Sort
View
ICNP
1999
IEEE
13 years 12 months ago
Receiver-Cooperative Bandwidth Management for Layered Multicast
In this paper, we propose a receiver-cooperative bandwidth management method for layered multicast streams, considering not only bandwidth requirements but also receivers' pr...
Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higash...
COMCOM
2004
85views more  COMCOM 2004»
13 years 7 months ago
Optimal PNNI complex node representations for restrictive costs
The Private Network-to-Network Interface (PNNI) is a scalable hierarchical protocol that allows ATM switches to be aggregated into clusters called peer groups. To provide good acc...
Ilias Iliadis
UIC
2010
Springer
13 years 6 months ago
Extracting Social and Community Intelligence from Digital Footprints: An Emerging Research Area
As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network i...
Daqing Zhang, Bin Guo, Bin Li, Zhiwen Yu
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
OPODIS
2004
13 years 9 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...