Sciweavers

14824 search results - page 2516 / 2965
» Security - Introduction
Sort
View
KBSE
2008
IEEE
15 years 10 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
LCN
2008
IEEE
15 years 10 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...
NDSS
2008
IEEE
15 years 10 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
NDSS
2008
IEEE
15 years 10 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
15 years 10 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
« Prev « First page 2516 / 2965 Last » Next »