Sciweavers

286 search results - page 39 / 58
» Transport and Application Protocol Scrubbing
Sort
View
CSCW
2002
ACM
14 years 9 months ago
Using speakeasy for ad hoc peer-to-peer collaboration
Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencie...
W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, ...
GLOBECOM
2010
IEEE
14 years 7 months ago
On the Use of Concurrent Multipath Transfer over Asymmetric Paths
Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...
IEEEIAS
2008
IEEE
15 years 4 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
CONCUR
2010
Springer
14 years 10 months ago
A Theory of Design-by-Contract for Distributed Multiparty Interactions
Reliability is a critical issue in many multi-organizational distributed applications, be they web services, financial protocols, scientific computing infrastructure, and software ...
Laura Bocchi, Kohei Honda, Emilio Tuosto, Nobuko Y...
DSN
2011
IEEE
13 years 9 months ago
Coercing clients into facilitating failover for object delivery
Abstract—Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its hostabstraction. Given that these services are replicated for s...
Wyatt Lloyd, Michael J. Freedman