Sciweavers

688 search results - page 136 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
USS
2004
14 years 11 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
ADHOC
2010
138views more  ADHOC 2010»
14 years 9 months ago
On the feasibility of UMTS-based Traffic Information Systems
Intelligent Transportation Systems (ITS) are a hot topic in the communications society. Currently, research is primarily focusing on setting up Vehicular Ad Hoc Networks (VANETs) ...
Christoph Sommer, Armin Schmidt, Yi Chen, Reinhard...
INFOCOM
2006
IEEE
15 years 3 months ago
MobiStream: Error-Resilient Video Streaming in Wireless WANs Using Virtual Channels
—We present MobiStream— a video streaming system that exploits the perceptual value in video content and the characteristics of the link layer and physical layer channels to en...
Rajiv Chakravorty, Suman Banerjee, Samrat Ganguly
94
Voted
MOBISEC
2009
Springer
15 years 4 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
ICSE
2003
IEEE-ACM
15 years 9 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann