Sciweavers

328 search results - page 23 / 66
» Identity-Enriched Session Management
Sort
View
INFOCOM
1999
IEEE
13 years 12 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
SIGCOMM
1998
ACM
13 years 12 months ago
Scalable QoS Provision Through Buffer Management
In recent years, a number of link scheduling algorithms have been proposed that greatly improve upon traditional FIFO scheduling in being able to assure rate and delay bounds for ...
Roch Guérin, Sanjay Kamat, Vinod G. J. Peri...
IFIP
2003
Springer
14 years 25 days ago
Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks Using Signal Strength Based Link Management
Mobility in ad hoc networks causes link failures, which in turn result in packet losses. TCP attributes these losses to congestion. This results in frequent TCP retransmission time...
Fabius Klemm, Srikanth V. Krishnamurthy, Satish K....
JISE
2007
98views more  JISE 2007»
13 years 7 months ago
Integrated Buffer and Route Management in a DTN with Message Ferry
Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivi...
Mooi Choo Chuah, Wenbin Ma
DAGSTUHL
2006
13 years 9 months ago
Managing Known Clones: Issues and Open Questions
Many software systems contained cloned code, i.e., segments of code that are highly similar to each other, typically because one has been copied from the other, and then possibly m...
Kostas Kontogiannis