Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
With multimedia applications, the Internet traffic increased a lot in volume, but also suffered major alterations in its nature, requesting other network services besides the curr...
Abstract--Mobile phones are increasingly able to read autoid labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, th...
—This paper presents a new economic approach for studying competition and innovation in a complex and highly interactive system of network providers, users, and suppliers of digi...
Zhi-Li Zhang, Papak Nabipay, Andrew M. Odlyzko, Ro...
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...