Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Network Protocols (C.2.2) > Applications (SMTP, FTP, etc.) (C.2.2...)  
 
Options:
 
  1-10 of 27 Reviews about "Applications (SMTP, FTP, etc.) (C.2.2...)": Date Reviewed
  Design and performance evaluation of NUMA-aware RDMA-based end-to-end data transfer systems
Ren Y., Li T., Yu D., Jin S., Robertazzi T.  SC 2013 (Proceedings of the International Conference for High-Performance Computing, Networking, Storage and Analysis, Denver, CO, Nov 17-21, 2013) 1-10, 2013.  Type: Proceedings

This interesting paper describes some expected (the transmission control protocol/Internet protocol (TCP/IP) stack) as well as unexpected (nonuniform memory access (NUMA) architecture and solid-state drive (SSD) storage devices) bottle...

Aug 22 2014
  Modeling BitTorrent-like systems with many classes of users
Liao W., Papadopoulos F., Psounis K., Psomas C. ACM Transactions on Modeling and Computer Simulation 23(2): 1-25, 2013.  Type: Article

Large-scale distributions of digital content over the Internet require effective algorithms and systems. The traditional BitTorrent model has been successful in the distribution of files on peer-to-peer (P2P) systems for homogeneous us...

Nov 18 2013
  Security model and framework for information aggregation in sensor networks
Manulis M., Schwenk J. ACM Transactions on Sensor Networks 5(2): 1-28, 2009.  Type: Article

Manulis and Schwenk introduce a formal communication and security model for in-network aggregation in wireless sensor networks (WSNs). A complete proof of the security of the model is rigorously done. A scenario where the aggregation i...

Jun 26 2009
  Fax, modem, and text for IP telephony
Hanes D., Salgueiro G., Cisco Press, 2008. 600 pp.  Type: Book (9781587052699), Reviews: (2 of 2)

Internet protocol (IP) telephony (IPT), or voice over IP (VoIP), has recently changed the telecommunications world, as it allows for transporting voice over IP networks, together with other types of traffic, in an integrated way. IPT o...

Feb 17 2009
  Fax, modem, and text for IP telephony
Hanes D., Salgueiro G., Cisco Press, 2008. 600 pp.  Type: Book (9781587052699), Reviews: (1 of 2)

With the popularity and penetration of the Internet, home and business communications are gradually being converted to Internet-based applications. Internet protocol (IP) telephony is becoming a reality. As a result, voic...

Nov 24 2008
  Advances in digital speech transmission
Martin R., Heute U., Antweiler C., Wiley Publishing, 2008. 572 pp.  Type: Book (9780470517390)

Presenting the state of the art in several speech-related technologies, this book may be considered a follow-up to a previously published title [1]. The style is different, since this one is an edited volume and not tutorial in nature....

Aug 8 2008
  Service automation and dynamic provisioning techniques in IP/MPLS environments (Wiley Series on Communications Networking & Distributed Systems)
Jacquenet C., Boucadair M., Bourdon G., Wiley Publishing, 2008. 346 pp.  Type: Book (9780470018293)

It is easy to find a book that deals with a particular contemporary communication technology, like Internet protocol with multiprotocol label switching (IP/MPLS), but it is very hard to find how services in such an environment can be a...

Aug 8 2008
  A coercion-resistant Internet voting protocol
Meng B.  ICSNC 2007 (Proc. of the 2nd International Conference on Systems and Networks Communications,Aug 25-31, 2007) 672007.  Type: Proceedings

An Internet voting protocol (IVP) is defined as a voting procedure that uses a computer to cast a ballot over the Internet. There are four types of Internet voting: remote IVP, kiosk IVP, polling places IVP, and precinct IVP. This pape...

Apr 24 2008
  Cheat-proof playout for centralized and peer-to-peer gaming
Baughman N., Liberatore M., Levine B. IEEE/ACM Transactions on Networking 15(1): 1-13, 2007.  Type: Article

With the popularity of the Internet, it is logical that computer games have evolved into Internet games. Unlike face-to-face games in which a player can see his or her opponents, Internet game players communicate by transmitting messag...

Jul 17 2007
  Hacking exposed VoIP: voice over IP security secrets & solutions
Endler D., Collier M., McGraw-Hill Osborne Media, 2006. 539 pp.  Type: Book (9780072263640), Reviews: (2 of 2)

This book is devoted to cracking voice over Internet protocol (VoIP) systems. It will be most relevant to practitioners in the field of building VoIP systems since it documents the known vulnerabilities in the VoIP offerings of several...

Jul 4 2007
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy