Sciweavers

2207 search results - page 144 / 442
» Security at the Internet Layer
Sort
View
140
Voted
ESAS
2006
Springer
15 years 8 months ago
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CSMR
2010
IEEE
14 years 11 months ago
ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable an
Web software development is one of the most active areas and fastest growing industries in software and services development in Europe, and, in particular, Java Enterprise Edition ...
Boni García, Juan C. Dueñas, Jos&eac...
171
Voted
WWW
2008
ACM
16 years 5 months ago
2lip: the step towards the web3d
The World Wide Web allows users to create and publish a variety of resources, including multimedia ones. Most of the contemporary best practices for designing web interfaces, howe...
Jacek Jankowski, Sebastian Ryszard Kruk
134
Voted
WWW
2004
ACM
16 years 5 months ago
Digital repository interoperability: design, implementation and deployment of the ecl protocol and connecting middleware
This paper describes the design and implementation of the eduSource Communication Layer (ECL) protocol. ECL is one outcome of a pan-Canadian project called eduSource Canada to bui...
Ty Mey Eap, Marek Hatala, Griff Richards