Sciweavers

537 search results - page 36 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ICMAS
1998
14 years 11 months ago
Leveled Commitment Contracting among Myopic Individually Rational Agents
In automated negotiation systems consisting of selfinterested agents, contracts have traditionally been binding, i.e., impossible to breach. Such contracts do not allow the agents...
Martin Andersson, Tuomas Sandholm
WS
2004
ACM
15 years 3 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
GLOBECOM
2006
IEEE
15 years 4 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
CORR
2007
Springer
132views Education» more  CORR 2007»
14 years 10 months ago
Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study
—Established in 2005, YouTube has become the most successful Internet site providing a new generation of short video sharing service. Today, YouTube alone comprises approximately...
Xu Cheng, Cameron Dale, Jiangchuan Liu
DOCENG
2011
ACM
13 years 9 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...