Sciweavers

303 search results - page 56 / 61
» On the enhancement of a differentiated services scheme
Sort
View
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
14 years 1 months ago
An Improved Resource Reservation Algorithm for IEEE 802.15.3
In this paper, we propose an improved resource reservation algorithm ESRPT (Enhanced Shortest Remaining Processing Time) for bursty traffic based on IEEE 802.15.3 standard. In thi...
Xin Liu, Qionghai Dai, Qiufeng Wu
ISW
2004
Springer
14 years 12 days ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
SAC
2000
ACM
13 years 11 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
ASPDAC
2000
ACM
109views Hardware» more  ASPDAC 2000»
13 years 10 months ago
A technique for QoS-based system partitioning
Quality of service (QoS) has been an important topic of many research communities. Combined with an advanced and retargetable compiler, variability of applicationsspecific very lar...
Johnson S. Kin, Chunho Lee, William H. Mangione-Sm...
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 10 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine