Sciweavers

722 search results - page 115 / 145
» Offering Mobile Security as a Service
Sort
View
ARCS
2006
Springer
14 years 2 months ago
Constraint-Based Deployment of Distributed Components in a Dynamic Network
Hierarchical software components offer interesting characteristics for the development of complex applications. However, supporting the deployment of such applications is difficult...
Didier Hoareau, Yves Mahéo
VCIP
2003
140views Communications» more  VCIP 2003»
14 years 6 days ago
Error-resilient performance evaluation of MPEG-4 and H.264
Recent advances in video coding technology have resulted in rapid growth of application in mobile communication. With this explosive growth, reliable transmission and error resili...
Bongsoo Jung, Younghooi Hwang, Byeungwoo Jeon, Myu...
PIMRC
2010
IEEE
13 years 8 months ago
Communication cost analysis of MBSFN in LTE
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 5 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 5 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...