Sciweavers

2583 search results - page 430 / 517
» Internet Messaging Frameworks
Sort
View
IJDE
2007
105views more  IJDE 2007»
14 years 11 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
JNCA
2007
125views more  JNCA 2007»
14 years 11 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
CN
2004
122views more  CN 2004»
14 years 11 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
ICDCS
2010
IEEE
14 years 10 months ago
'Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks
—Networks based on Ethernet bridging scale poorly as bridges flood the entire network repeatedly, and several schemes have been proposed to mitigate this flooding problem; howe...
Dhananjay Sampath, Suchit Agarwal, J. J. Garcia-Lu...
REPLICATION
2010
14 years 10 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman