Sciweavers

680 search results - page 68 / 136
» Locating Hidden Servers
Sort
View
CSE
2008
IEEE
15 years 4 months ago
An Experimental Peer-to-Peer E-mail System
Conventional e-mail systems are prone to problems that affect their dependability. E-mail systems operate following a “push-based” approach: the sender side server pushes the ...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
ICDCS
2008
IEEE
15 years 4 months ago
Relative Network Positioning via CDN Redirections
—Many large-scale distributed systems can benefit from a service that allows them to select among alternative nodes based on their relative network positions. A variety of appro...
Ao-Jan Su, David R. Choffnes, Fabián E. Bus...
ICASSP
2007
IEEE
15 years 4 months ago
Real Time 3D Avatar Transmission using Cylinder Mapping
In this paper, we propose a client-sever system, which accomplishes acquisition, transmission and reconstruction of the 3D shape at a remote location in real time. The server cons...
Shin-ichiro Takahashi, Masaaki Ikehara, Ishtiaq Ra...
COMSWARE
2006
IEEE
15 years 3 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
SRDS
2003
IEEE
15 years 3 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...