Sciweavers

2904 search results - page 430 / 581
» Internet Infrastructure Security
Sort
View
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
136
Voted
P2P
2003
IEEE
108views Communications» more  P2P 2003»
15 years 9 months ago
Multicast in DKS(N, k, f) Overlay Networks
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures fo...
Luc Onana Alima, Ali Ghodsi, Sameh El-Ansary, Per ...
ICCCN
2007
IEEE
15 years 7 months ago
Implementation of a Wireless Mesh Network Testbed for Traffic Control
Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many ...
Kun-Chan Lan, Zhe Wang, Rodney Berriman, Tim Moors...
ICWN
2004
15 years 5 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild
IADIS
2003
15 years 5 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson