Sciweavers

212 search results - page 37 / 43
» CloudPolice: taking access control out of the network
Sort
View
PERVASIVE
2004
Springer
14 years 2 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
ISCC
2003
IEEE
14 years 2 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
CN
2006
161views more  CN 2006»
13 years 9 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
INFOCOM
2010
IEEE
13 years 7 months ago
Cooperative Resource Management in Cognitive WiMAX with Femto Cells
Abstract—WiMAX with femto cells is a cost-effective nextgeneration broadband wireless communication system. Cognitive Radio (CR) has recently emerged as a promising technology to...
Jin Jin, Baochun Li
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim