Sciweavers

6014 search results - page 973 / 1203
» Parametric Analysis of Computer Systems
Sort
View
BROADNETS
2005
IEEE
15 years 10 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
15 years 10 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 10 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
MINENET
2005
ACM
15 years 10 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...
MMSEC
2005
ACM
132views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Resolution and quality scalable spread spectrum image watermarking
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...