Sciweavers

1030 search results - page 165 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
SPW
2005
Springer
15 years 3 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
ITNG
2006
IEEE
15 years 3 months ago
Adding High Level VoIP Facilities to the Unicon Language
Many programming languages have built-in functions for socket programming and data communications. These days, the Internet is widely used for voice communications that employ a V...
Ziad Al-Sharif, Clinton Jeffery
NOCS
2009
IEEE
15 years 4 months ago
Flow-aware allocation for on-chip networks
Current Virtual-Channel routers disregard potentially useful information about on-chip communication flows. This often leads to inefficient resource utilisation in existing Netwo...
Arnab Banerjee, Simon W. Moore
59
Voted
NETWORKING
2004
14 years 11 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
IJWIN
2002
166views more  IJWIN 2002»
14 years 9 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz