Sciweavers

9581 search results - page 1758 / 1917
» On Ubiquitous Integrated Computing
Sort
View
IPPS
2008
IEEE
15 years 11 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
NDSS
2008
IEEE
15 years 11 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
134
Voted
ACSC
2007
IEEE
15 years 11 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
136
Voted
ACSC
2007
IEEE
15 years 11 months ago
Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures
Mobile technology is particularly suited to a fully distributed (replicated) architecture for collaborative work. Users can maintain their own document copies, and can continue to...
Sandy Citro, Jim McGovern, Caspar Ryan
179
Voted
BROADNETS
2007
IEEE
15 years 11 months ago
Reduced flow routing: Leveraging residual capacity to reduce blocking in GMPLS networks
— Traffic engineering has been extensively studied to maximize network resource utilization while minimizing call blocking [1]. As the the demand for high data rate services ove...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
« Prev « First page 1758 / 1917 Last » Next »