Sciweavers

8772 search results - page 1644 / 1755
» Business Services Networks
Sort
View
GLOBECOM
2007
IEEE
14 years 4 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
GLOBECOM
2007
IEEE
14 years 4 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin
GLOBECOM
2007
IEEE
14 years 4 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
GLOBECOM
2007
IEEE
14 years 4 months ago
Virtualization of Local Computer Bus Architectures Over the Internet
We propose a companion solution to iSCSI that is more suited for virtualization of local computer bus architectures, such as PCI/PCI-X and PCI Express. We explore the architecture ...
David A. Daniel, Joseph Y. Hui
ICAC
2007
IEEE
14 years 4 months ago
A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications
— The multi-tier implementation has become the industry standard for developing scalable client-server enterprise applications. Since these applications are performance sensitive...
Qi Zhang, Ludmila Cherkasova, Evgenia Smirni
« Prev « First page 1644 / 1755 Last » Next »