Sciweavers

1030 search results - page 60 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IH
1998
Springer
15 years 1 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
SEUS
2007
IEEE
15 years 4 months ago
A QoS Routing Protocol for Mobile Ad Hoc Networks Based on a Reservation Pool
Even without possible interference from external radio sources, the problem of guaranteeing quality-of-service (QoS) routing in mobile ad hoc networks (MANETs) is a difficult probl...
Donghak Pyo, Sunggu Lee, Min-Gu Lee
IJAHUC
2011
143views more  IJAHUC 2011»
14 years 1 months ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
AINA
2004
IEEE
15 years 1 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
HPN
1994
14 years 11 months ago
Fast Connection Establishment in the DTM Gigabit Network
Dynamic synchronous Transfer Mode (DTM) is a new protocol suite based on synchronous fast circuit switching. The DTM network is based on bandwidth reservation and supports dynamic...
Per Lindgren, Christer Bohm