Sciweavers

1030 search results - page 99 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MOBIHOC
2007
ACM
16 years 3 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
COMPSAC
2007
IEEE
15 years 10 months ago
An Instant Messaging Framework for Flexible Interaction with Rich Clients
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to ...
Matthias Book, Volker Gruhn
WWW
2006
ACM
16 years 4 months ago
Designing an architecture for delivering mobile information services to the rural developing world
Paper plays a crucial role in many developing world information practices. However, paper-based records are inefficient, error-prone and difficult to aggregate. Therefore we need ...
Tapan S. Parikh, Edward D. Lazowska
IMC
2006
ACM
15 years 10 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
INTERSPEECH
2010
14 years 11 months ago
Building transcribed speech corpora quickly and cheaply for many languages
We present a system for quickly and cheaply building transcribed speech corpora containing utterances from many speakers in a variety of acoustic conditions. The system consists o...
Thad Hughes, Kaisuke Nakajima, Linne Ha, Atul Vasu...