Sciweavers

1314 search results - page 223 / 263
» New Approaches for Virtual Private Network Design
Sort
View
157
Voted
CSFW
2012
IEEE
13 years 4 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
MM
2004
ACM
116views Multimedia» more  MM 2004»
15 years 7 months ago
First-year students' paper chase: a mobile location-aware multimedia game
The latest achievements in the field of mobile networks and ubiquitous computing enable the integration and combination of technologies like Internet, Java, and multimedia in a n...
Palle Klante, Jens Krösche, Daniela Ratt, Sus...
125
Voted
CLUSTER
2004
IEEE
15 years 1 months ago
DyRAM: An Active Reliable Multicast Framework for Data Distribution
Group communications (multicast) are foreseen to be one of the most critical yet challenging technologies to meet the exponentially growing demands for data distribution in a large...
Moufida Maimour, CongDuc Pham
CN
2007
91views more  CN 2007»
15 years 1 months ago
On investigating overlay service topologies
Recently, a moderate amount of work has been reported on the use of overlay networks to support value-added network services, such as multicasting, Quality of Service (QoS), secur...
Zhi Li, Prasant Mohapatra
93
Voted
SENSYS
2003
ACM
15 years 7 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin