Sciweavers

475 search results - page 85 / 95
» Evaluation of an Adaptive Transport Protocol
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
14 years 8 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
ICUMT
2009
14 years 7 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
96
Voted
ADHOC
2008
88views more  ADHOC 2008»
14 years 9 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
MUC
1992
15 years 1 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
NETGAMES
2004
ACM
15 years 3 months ago
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Today’s Multi-player Online Games (MOGs) are challenged by infrastructure requirements, because of their server-centric nature. Peer-to-peer networks are an interesting alternat...
Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi