Sciweavers

1748 search results - page 193 / 350
» Security Models for Heterogeneous Networking
Sort
View
CONEXT
2010
ACM
15 years 2 months ago
Balancing throughput, robustness, and in-order delivery in P2P VoD
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood--yet choo...
Bin Fan, David G. Andersen, Michael Kaminsky, Kons...
IMSCCS
2006
IEEE
15 years 10 months ago
An Execution Prototype of Mobile Agent-Based Peer-to-Peer Systems
Peer-to-peer networks are one of the trends in the field of internetworking. Mobile agent-based technology is a newly proposed technology that can be used in peer-to-peer network...
Wenyu Qu, Masaru Kitsuregawa, Keqiu Li, Hong Shen
MSWIM
2006
ACM
15 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ICCCN
2008
IEEE
15 years 10 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
COMCOM
2006
121views more  COMCOM 2006»
15 years 4 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal