Sciweavers

WETICE
2007
IEEE
15 years 6 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
WETICE
2007
IEEE
15 years 6 months ago
Context Adaptation of Web Service Orchestrations
With orchestrations, one service may be realized through the cooperation of several services. This cooperation has to be formally described. In this paper, we propose to describe ...
Frédérick Seyler, Chantal Taconet, G...
WETICE
2007
IEEE
15 years 6 months ago
A Tuple-Space Based Middleware for Collaborative Tangible User Interfaces
Several approaches have been made to establish a generic middleware for tangible user interfaces (TUI). They target toward the independence of application domains as well as flexi...
Florian Georg Furtmüller, Stefan Oppl
WETICE
2007
IEEE
15 years 6 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
Emerging Technology
Top of PageReset Settings