Sciweavers

3031 search results - page 188 / 607
» Reuse in the application layer
Sort
View
SEC
2004
15 years 5 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
FIS
2008
15 years 6 months ago
Unlock Your Data: The Case of MyTag
The business model of Web2.0 applications like FaceBook, Flickr, YouTube and their likes is based on an asymmetry: Users generate content, Web2.0 application providers own, (i), th...
Thomas Franz, Klaas Dellschaft, Steffen Staab
IPPS
2006
IEEE
15 years 10 months ago
Performance analysis of parallel programs via message-passing graph traversal
The ability to understand the factors contributing to parallel program performance are vital for understanding the impact of machine parameters on the performance of specific app...
Matthew J. Sottile, Vaddadi P. Chandu, David A. Ba...
89
Voted
GI
2004
Springer
15 years 10 months ago
The eDonkey File-Sharing Network
Abstract: The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to...
Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf S...
INFOCOM
2003
IEEE
15 years 9 months ago
Analysis on Packet Resequencing for Reliable Network Protocols
Abstract— Protocols such as TCP require packets to be accepted (i.e., delivered to the receiving application) in the order they are transmitted at the sender. Packets are sometim...
Ye Xia, David N. C. Tse