Sciweavers

20 search results - page 3 / 4
» Implementing a User Level Multimedia Transport Protocol in J...
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 5 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
MM
2000
ACM
99views Multimedia» more  MM 2000»
13 years 10 months ago
A generic late-join service for distributed interactive media
In this paper we present a generic late-join service for distributed interactive media, i.e., networked media which involve user interactions. Examples for distributed interactive...
Jürgen Vogel, Martin Mauve, Werner Geyer, Vol...
ATC
2008
Springer
13 years 7 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
KBSE
2007
IEEE
14 years 2 days ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
COMPSAC
2005
IEEE
13 years 11 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho