Sciweavers

1035 search results - page 207 / 207
» System Services for Implementing Ad-Hoc Routing Protocols
Sort
View
TMC
2010
143views more  TMC 2010»
13 years 3 months ago
Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
—This paper deals with decentralized, QoS-aware middleware for checkpointing arrangement in Mobile Grid (MoG) computing systems. Checkpointing is more crucial in MoG systems than...
Paul J. Darby III, Nian-Feng Tzeng
RTAS
1998
IEEE
13 years 9 months ago
Performance Analysis of an RSVP-Capable Router
RSVP is a bandwidth reservation protocol that allows distributed real-time applications such as video-conferencing software to make bandwidth reservations over packetswitched netw...
Tzi-cker Chiueh, Anindya Neogi, Paul A. Stirpe
CCS
2009
ACM
14 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
DIM
2008
ACM
13 years 6 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
ISICT
2004
13 years 6 months ago
Extending desktop applications to the web
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
Arno Puder