Sciweavers

305 search results - page 50 / 61
» Developing pervasive services for future telecommunication n...
Sort
View
ECOWS
2006
Springer
13 years 11 months ago
A Multimedia-Specific Approach to WS-Agreement
WS-Agreement offers a general language and protocol to establish agreements between two parties. In principle, this generality enables a wide variety of domains to be covered. Yet...
Wilfried Jouve, Julien Lancia, Charles Consel, Cal...
DKE
2011
260views Education» more  DKE 2011»
12 years 11 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
GLOBECOM
2008
IEEE
14 years 2 months ago
Optimal Location Updates in Mobile Ad Hoc Networks: A Separable Cost Case
Abstract—We consider the location service in a mobile adhoc network (MANET), where each node needs to maintain its location information in the network by (i) frequently updating ...
Zhenzhen Ye, Alhussein A. Abouzeid
ACSAC
1999
IEEE
14 years 1 days ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
ENTCS
2008
390views more  ENTCS 2008»
13 years 6 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel