Sciweavers

1016 search results - page 177 / 204
» Peering Peer-to-Peer Providers
Sort
View
WS
2004
ACM
14 years 1 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
KES
2004
Springer
14 years 1 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
MWCN
2004
Springer
14 years 1 months ago
Enabling Energy Demand Response with Vehicular Mesh Networks
Inter-vehicle communication is becoming increasingly important in recent years. Traditional research efforts on vehicular networks have been put into safety or infotainment applica...
Howard CheHao Chang, Haining Du, Joey Anda, Chen-N...
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
14 years 1 months ago
IRTL (Information Resource Transaction Layer) Middleware Design for P2P and Open GRID Services
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterog...
Junseok Hwang, Praveen Aravamudham, Elizabeth D. L...
EUROPAR
2003
Springer
14 years 1 months ago
Preventive Multi-master Replication in a Cluster of Autonomous Databases
We consider the use of a cluster of PC servers for Application Service Providers where applications and databases must remain autonomous. We use data replication to improve data av...
Esther Pacitti, M. Tamer Özsu, Cédric ...