Sciweavers

1845 search results - page 250 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
MOBISYS
2005
ACM
16 years 1 months ago
Slingshot: deploying stateful services in wireless hotspots
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At...
Ya-Yunn Su, Jason Flinn
AINA
2008
IEEE
15 years 8 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su
93
Voted
ICPADS
2008
IEEE
15 years 8 months ago
Plug: Virtual Worlds for Millions of People
We propose the design of Plug, an application to find and keep contacts with friends within many inter-connected 3D virtual worlds. Users use an instant messenger (IM)-like inter...
Shun-Yun Hu, Jehn-Ruey Jiang
ICDCS
2007
IEEE
15 years 7 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
GCC
2007
Springer
15 years 7 months ago
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
Many Internet applications use overlay networks as their basic facilities, like resource sharing, collaborative computing, and so on. Considering the communication cost, most over...
Zhenhua Li, Guihai Chen