Sciweavers

20813 search results - page 356 / 4163
» Introduction to Computer Networking
Sort
View
133
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Detecting third-party addresses in traceroute IP paths
Traceroute is probably the most famous computer networks diagnostic tool, widely adopted for both performance troubleshooting and research. Unfortunately, traceroute is not free o...
Pietro Marchetta, Walter de Donato, Antonio Pescap...
148
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
RaptorStream: boosting mobile peer-to-peer streaming with raptor codes
As mobile devices and cellular networks become ubiquitous, first apps for popular P2P video streaming networks emerge. We have observed that when these applications operate in ce...
Philipp M. Eittenberger
92
Voted
PERCOM
2008
ACM
16 years 3 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
PERCOM
2008
ACM
16 years 3 months ago
A Context Query Language for Pervasive Computing Environments
This paper identifies requirements for querying and accessing context information in mobile and pervasive computing environments. Furthermore it studies existing query languages s...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...
130
Voted
PERCOM
2007
ACM
16 years 3 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong