Sciweavers

4761 search results - page 797 / 953
» Performance of Protocols
Sort
View
ISCIS
2005
Springer
15 years 9 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy
121
Voted
NOSSDAV
2005
Springer
15 years 9 months ago
Supporting P2P gaming when players have heterogeneous resources
We present Ghost, a peer-to-peer game architecture that manages game consistency across a set of players with heterogeneous network resources. Ghost dynamically creates responsive...
Aaron St. John, Brian Neil Levine
111
Voted
OTM
2005
Springer
15 years 9 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
109
Voted
OTM
2005
Springer
15 years 9 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
105
Voted
VIZSEC
2005
Springer
15 years 9 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...