Sciweavers

1030 search results - page 165 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
130
Voted
SPW
2005
Springer
15 years 9 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
110
Voted
ITNG
2006
IEEE
15 years 9 months ago
Adding High Level VoIP Facilities to the Unicon Language
Many programming languages have built-in functions for socket programming and data communications. These days, the Internet is widely used for voice communications that employ a V...
Ziad Al-Sharif, Clinton Jeffery
87
Voted
NOCS
2009
IEEE
15 years 10 months ago
Flow-aware allocation for on-chip networks
Current Virtual-Channel routers disregard potentially useful information about on-chip communication flows. This often leads to inefficient resource utilisation in existing Netwo...
Arnab Banerjee, Simon W. Moore
93
Voted
NETWORKING
2004
15 years 5 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
151
Voted
IJWIN
2002
166views more  IJWIN 2002»
15 years 3 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz