Sciweavers

849 search results - page 139 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
NETWORK
2006
218views more  NETWORK 2006»
13 years 8 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
ICC
2009
IEEE
13 years 6 months ago
OFDMA-TDD Networks with Busy Burst Enabled Grid-of-Beam Selection
Abstract--Interference aware user scheduling in fixed gridof-beam (GoB) transmission is envisaged to significantly benefit from the receiver initiated busy burst (BB) protocol. Fix...
Birendra Ghimire, Gunther Auer, Harald Haas
SRDS
2006
IEEE
14 years 2 months ago
Satem: Trusted Service Code Execution across Transactions
Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the...
Gang Xu, Cristian Borcea, Liviu Iftode
DCOSS
2005
Springer
14 years 2 months ago
Design of Adaptive Overlays for Multi-scale Communication in Sensor Networks
In wireless sensor networks, energy and communication bandwidth are precious resources. Traditionally, layering has been used as a design principle for network stacks; hence routin...
Santashil PalChaudhuri, Rajnish Kumar, Richard G. ...
JSW
2006
71views more  JSW 2006»
13 years 8 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello