Sciweavers

1035 search results - page 106 / 207
» System Services for Implementing Ad-Hoc Routing Protocols
Sort
View
CSCW
2012
ACM
12 years 3 months ago
Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization
Users have come to rely on automated route finding services for driving, public transit, walking, and bicycling. Current state of the art route finding algorithms typically rely...
Reid Priedhorsky, David Pitchford, Shilad Sen, Lor...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 2 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
SAINT
2008
IEEE
14 years 2 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...