In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
: This paper discusses the issues and promising approaches in (1) obtaining rigorous specifications of the quality-of-service (QoS) requirements associated with application functio...
This paper considers the problem of computer user support and workplace learning in general. Theoretically our work is influenced by ideas on knowledge management, expertise netwo...