Sciweavers

683 search results - page 132 / 137
» Infrastructure for Pervasive Computing: Challenges
Sort
View
IDTRUST
2009
ACM
15 years 5 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
89
Voted
IMC
2009
ACM
15 years 4 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
100
Voted
WCNC
2008
IEEE
15 years 4 months ago
A Transcoding-Free Multiple Description Coder for Voice over Mobile Ad-Hoc Networks
— We propose a new multiple description (MD) coder design based on the Adaptive Multi-Rate Wideband (AMRWB) coder that can support transcoding-free communication between an ad-ho...
Jagadeesh Balam, Jerry D. Gibson
110
Voted
WIMOB
2007
IEEE
15 years 4 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang
91
Voted
ICSOC
2007
Springer
15 years 4 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...