Sciweavers

1030 search results - page 94 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
WWW
2004
ACM
16 years 4 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
HOTI
2005
IEEE
15 years 9 months ago
Zero Copy Sockets Direct Protocol over InfiniBand - Preliminary Implementation and Performance Analysis
Sockets Direct Protocol (SDP) is a byte-stream transport protocol implementing the TCP SOCK_STREAM semantics utilizing transport offloading capabilities of the InfiniBand fabric. ...
Dror Goldenberg, Michael Kagan, Ran Ravid, Michael...
MSWIM
2006
ACM
15 years 10 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 4 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
168
Voted
NCA
2005
IEEE
15 years 9 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...