Sciweavers

7329 search results - page 1449 / 1466
» Network Extractor Protocols
Sort
View
CCGRID
2005
IEEE
15 years 3 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
MM
2005
ACM
103views Multimedia» more  MM 2005»
15 years 3 months ago
Simulated virtual market place by using voiscape communication medium
We are developing a new voice communication medium called voiscape. Voiscape enables natural and seamless bi-directional voice communication by using sound to create a virtual sou...
Yasusi Kanada
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
97
Voted
DRM
2005
Springer
15 years 3 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
IPOM
2005
Springer
15 years 3 months ago
Comprehensive Solution for Anomaly-Free BGP
The Internet consists of many self-administered and inter-connected AutonomousSystems(ASms). ASms exchangeinter-AS routing information with each other via the Border Gateway Protoc...
Ravi Musunuri, Jorge Arturo Cobb
« Prev « First page 1449 / 1466 Last » Next »