Sciweavers

7544 search results - page 1316 / 1509
» Network Forensics Analysis
Sort
View
CN
2006
124views more  CN 2006»
15 years 4 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
CN
2007
117views more  CN 2007»
15 years 4 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
JCM
2006
89views more  JCM 2006»
15 years 4 months ago
A Premium Traffic Management in DiffServ Through End-to-End Delay Budget Partitioning
Our novel Call Admission Control (CAC) scheme [1], [2] determines the number of Expedited Forwarding (EF) (Premium) flows accepted, based on e2e available bandwidth measurement. Ho...
Hamada Alshaer, Eric Horlait
MTA
2008
132views more  MTA 2008»
15 years 4 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla
NAR
2006
87views more  NAR 2006»
15 years 4 months ago
From genomics to chemical genomics: new developments in KEGG
The increasing amount of genomic and molecular information is the basis for understanding higherorder biological systems, such as the cell and the 15 organism, and their interacti...
Minoru Kanehisa, Susumu Goto, Masahiro Hattori, Ki...
« Prev « First page 1316 / 1509 Last » Next »