Sciweavers

2947 search results - page 514 / 590
» The timely token protocol
Sort
View
NETWORKING
2008
15 years 1 months ago
Modeling Priority-Based Incentive Policies for Peer-Assisted Content Delivery Systems
Content delivery providers can improve their service scalability and offload their servers by making use of content transfers among their clients. To provide peers with incentive t...
Niklas Carlsson, Derek L. Eager
NETWORKING
2007
15 years 1 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
AAAI
2006
15 years 1 months ago
Local Negotiation in Cellular Networks: From Theory to Practice
This paper describes a novel negotiation protocol for cellular networks, which intelligently improves the performance of the network. Our proposed reactive mechanism enables the d...
Raz Lin, Daphna Dor-Shifer, Sarit Kraus, David Sar...
CNIS
2006
15 years 1 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
DAIS
2003
15 years 1 months ago
A Flexible Middleware Layer for User-to-User Messaging
Abstract. There is growing trend to unify user-to-user messaging systems to allow message exchange, independent of time, place, protocol, and end-user device. Building gateways to ...
Jan-Mark S. Wams, Maarten van Steen