Sciweavers

328 search results - page 43 / 66
» Identity-Enriched Session Management
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 2 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CISS
2008
IEEE
14 years 2 months ago
On wireless network scheduling with intersession network coding
Abstract—Cross-layer optimization including congestion control, routing, and scheduling has shown dramatic throughput improvement over layered designs for wireless networks. In p...
Chih-Chun Wang, Ness B. Shroff
ICDS
2008
IEEE
14 years 2 months ago
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments
In order to provide a generic, applicationindependent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing ...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb
ICIW
2008
IEEE
14 years 2 months ago
Graphical History List with Multi-window Support on a Mobile Web Browser
— Rolling back to previously visited Web pages and opening multiple browser windows or tabs at the same time are common activities in a Web browsing session on a PC. When using a...
Elina Vartiainen, Virpi Roto, Janne Kaasalainen
ICPADS
2008
IEEE
14 years 2 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi