Sciweavers

76 search results - page 13 / 16
» Broadband application transport service and management
Sort
View
WWW
2008
ACM
14 years 6 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
IEEEARES
2008
IEEE
14 years 11 days ago
Rapid Detection of Constant-Packet-Rate Flows
—The demand for effective VoIP and online gaming traffic management methods continues to increase for purposes such as QoS provisioning, usage accounting, and blocking VoIP call...
Kuan-Ta Chen, Jing-Kai Lou
AICT
2007
IEEE
180views Communications» more  AICT 2007»
14 years 9 days ago
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid developm...
Karim Mohammed Rezaul, Vic Grout
EPEW
2007
Springer
14 years 3 days ago
Workload Characterization of the SPECjms2007 Benchmark
Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as man...
Kai Sachs, Samuel Kounev, Jean Bacon, Alejandro P....
GCC
2006
Springer
13 years 9 months ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...