Sciweavers

2200 search results - page 198 / 440
» Hop Integrity in Computer Networks
Sort
View
153
Voted
AP2PS
2009
IEEE
15 years 8 months ago
Performance Evaluation of a Chord-Based JXTA Implementation
In this paper, we propose a new implementation of the JXTA framework, based on the integration of the original JXTA version with the Chord DHT management protocol. The resulting ne...
Carlo Nocentini, Pilu Crescenzi, Leonardo Lanzi
PERCOM
2010
ACM
15 years 2 months ago
Embedding Semantic Product Memories in the web of things
—Today, RFID is used to identify a wide range of work pieces or individual products for tracking their movements through the logistics chain. For future purposes the idea of stor...
Christian Seitz, Christoph Legat, Jörg Neidig

Publication
194views
17 years 2 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
108
Voted
SERSCISA
2009
Springer
15 years 10 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...
109
Voted
ICYCS
2008
IEEE
15 years 10 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...