Sciweavers

7329 search results - page 1367 / 1466
» Network Extractor Protocols
Sort
View
157
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
105
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Self management of a mobile thin client service
Mobile thin client computing is an enabler for the execution of demanding applications from mobile handhelds. In thin client computing, the application is executed on remote serve...
Lien Deboosere, Bert Vankeirsbilck, Pieter Simoens...
ANSS
2008
IEEE
15 years 10 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
109
Voted
ETFA
2008
IEEE
15 years 10 months ago
Segmentation of standard ethernet messages in the time-triggered ethernet
TT Ethernet is a communication architecture which allows the integration of the standard Ethernet traffic and real-time Ethernet traffic in the same network without invalidating...
Vaclav Mikolasek, Astrit Ademaj, Stanislav Racek
168
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
« Prev « First page 1367 / 1466 Last » Next »