Sciweavers

5234 search results - page 885 / 1047
» Simulation of Computer Network Attacks
Sort
View
129
Voted
CSE
2009
IEEE
15 years 10 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
139
Voted
ICPP
2008
IEEE
15 years 10 months ago
Fast Source Switching for Gossip-Based Peer-to-Peer Streaming
In this paper we consider gossip-based Peer-to-Peer streaming applications where multiple sources exist and they work serially. More specifically, we tackle the problem of fast s...
Zhenhua Li, Jiannong Cao, Guihai Chen, Yan Liu
IPPS
2008
IEEE
15 years 10 months ago
ContinuStreaming: Achieving high playback continuity of Gossip-based Peer-to-Peer streaming
Gossip-based Peer-to-Peer(P2P) streaming has been proved to be an effective and resilient method to stream qualified media contents in dynamic and heterogeneous network environme...
Zhenhua Li, Jiannong Cao, Guihai Chen
PERVASIVE
2007
Springer
15 years 10 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...
142
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 2 months ago
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different locatio...
Ling Zhou, Wei-xiong Ding, Yu-xi Zhu