Sciweavers

3486 search results - page 365 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
119
Voted
PERCOM
2007
ACM
16 years 3 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
127
Voted
PERCOM
2005
ACM
16 years 3 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
129
Voted
MOBICOM
2003
ACM
15 years 9 months ago
Geographic routing without location information
For many years, scalable routing for wireless communication systems was a compelling but elusive goal. Recently, several routing algorithms that exploit geographic information (e....
Ananth Rao, Christos H. Papadimitriou, Scott Shenk...
134
Voted
WOSP
2005
ACM
15 years 9 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
118
Voted
ISSA
2004
15 years 5 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche