Sciweavers

2656 search results - page 478 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
SAC
2006
ACM
15 years 8 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
INFOCOM
2003
IEEE
15 years 7 months ago
Optimal Quality Adaptation for MPEG-4 Fine-Grained Scalable Video
— Dynamic behavior of the Internet’s transmission resources makes it difficult to provide perceptually good quality of streaming video. MPEG-4 Fine-Grained Scalable coding is ...
Taehyun Kim, Mostafa H. Ammar
ISCC
2000
IEEE
15 years 6 months ago
Light Weight Security for Parallel Access to Multiple Mirror Sites
Mirror sites approach has been proposed recently for reducing the access delay and providing load balancing in network servers. In the mirror site approach a file, such as a multi...
Bülent Yener
INFOCOM
2010
IEEE
15 years 13 days ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
INFOCOM
2007
IEEE
15 years 8 months ago
Losing Opportunism: Evaluating Service Integration in an Opportunistic Wireless System
Abstract— In this paper we evaluate interactions among flowlevel performance metrics when integrating QoS and best effort flows in a wireless system using opportunistic schedul...
Hongseok Kim, Gustavo de Veciana