Sciweavers

367 search results - page 20 / 74
» An Approach to User Management of Broadband Services
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICWS
2009
IEEE
13 years 5 months ago
Web Service Mashup Middleware with Partitioning of XML Pipelines
Traditionally, the composition of Web services to create mashups has been achieved by using an application server as a mediator between a client browser and services. To avoid thi...
Eric Wohlstadter, Peng Li, Brett Cannon
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 9 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
ATAL
2007
Springer
14 years 1 months ago
Intelligent agent framework for order entry and management
This paper describes an agent system we have built to handle order entry and management issue in business computing and specialized in the telecommunication domain. Our system is ...
Thuc Duong Nguyen, Simon Thompson
CCR
2006
103views more  CCR 2006»
13 years 7 months ago
A distributed traffic control scheme based on edge-centric resource management
The correct admission of flows in the Differentiated Services (DiffServ) environment is critical to provide stable and predictable quality of service (QoS) to the end user. Withou...
Yingxin Jiang, Aaron Striegel