This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Web services are key applications in business-to-business, business-to-customer, and enterprise applications integration solutions. As the mobile Internet becomes one of the main ...
Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok...
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
The number of active users, their timing offsets, and their (possibly dispersive) channels with the access point are decisive parameters for wireless code division multiple access...
Daniele Angelosante, Emanuele Grossi, Georgios B. ...
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...