Sciweavers

2187 search results - page 327 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
P2P
2003
IEEE
110views Communications» more  P2P 2003»
14 years 2 months ago
Range Addressable Network: A P2P Cache Architecture for Data Ranges
Peer-to-peer computing paradigm is emerging as a scalable and robust model for sharing media objects. In this paper, we propose an architecture and describe the associated algorit...
Anshul Kothari, Divyakant Agrawal, Abhishek Gupta,...
WWW
2003
ACM
14 years 10 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
JMM2
2006
95views more  JMM2 2006»
13 years 9 months ago
Video Streaming over MBMS: A System Design Approach
Recently, Multimedia Broadcast Multicast Service (MBMS) has been specified by 3GPP as a Release 6 feature in order to meet the increasing demands of multimedia download and streami...
Junaid Afzal, Thomas Stockhammer, Tiago Gasiba, We...
HPDC
2005
IEEE
14 years 2 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny