Sciweavers

612 search results - page 87 / 123
» Providing Time of Service Guarantees in Video-On-Demand Serv...
Sort
View
JNW
2008
129views more  JNW 2008»
13 years 8 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
ECCC
2010
98views more  ECCC 2010»
13 years 7 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
14 years 3 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
CONCUR
2008
Springer
13 years 10 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...