Sciweavers

173
Voted
AINA
2015
IEEE
9 years 12 months ago
Content Access Control Scheme for P2P Networks Using a Reputation Value
—In recent years, with the improvement of the high speed communication infrastructure, P2P content distribution systems have been attracting more attention. In a P2P content dist...
Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naon...
162
Voted
AIMS
2015
Springer
9 years 12 months ago
Characterizing the IPv6 Security Landscape by Large-Scale Measurements
Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As e...
Luuk Hendriks, Anna Sperotto, Aiko Pras
97
Voted
AIMS
2015
Springer
9 years 12 months ago
How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute
A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it’s target from the viewpoint of the latter is ...
Wouter Willem de Vries, José Jair Santanna,...
105
Voted
AIME
2015
Springer
9 years 12 months ago
Using a virtual environment to test a mobile app for the ambient assisted living
In recent years the number of ICT-based solutions for the Ambient/Active Assisted Living (AAL) has grown continuously. Such technologies need to be validated before being used on a...
Paolo Calvaresi, Aldo Franco Dragoni, Matteo Pierd...