Sciweavers

644 search results - page 90 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
USAB
2010
14 years 10 months ago
An Experimental Investigation of the Akamai Adaptive Video Streaming
Akamai oers the largest Content Delivery Network (CDN) service in the world. Building upon its CDN, it recently started to offer High Denition (HD) video distribution using HTTP-...
Luca De Cicco, Saverio Mascolo
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
14 years 11 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 12 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
SIGMETRICS
2000
ACM
217views Hardware» more  SIGMETRICS 2000»
14 years 11 months ago
Experimenting with an Ad Hoc wireless network on campus: insights and experiences
Ad hoc wireless networks are new communication networks that can be dynamically formed and deformed onthe- y, anytime and anywhere. User data is routed with the help of an ad hoc ...
Chai-Keong Toh, Richard Chen, Minar Delwar, Donald...
ACSC
2004
IEEE
15 years 3 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer