Sciweavers

194 search results - page 32 / 39
» Mobile Agent Data Integrity Using Multi-agent Architecture
Sort
View
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 9 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
DAGSTUHL
2003
13 years 9 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec
IPPS
2000
IEEE
13 years 12 months ago
Enhancing NWS for Use in an SNMP Managed Internetwork
The Network Weather Service NWS is a distributed resource monitoring and utilization prediction system, employed as an aid to scheduling jobs in a metacomputing environment 9, 1...
Robert E. Busby Jr., Mitchell L. Neilsen, Daniel A...
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ATAL
2007
Springer
14 years 1 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...