Sciweavers

2442 search results - page 411 / 489
» Secure Service Orchestration
Sort
View
JCIT
2007
159views more  JCIT 2007»
13 years 9 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
JCP
2007
86views more  JCP 2007»
13 years 9 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza
JSAC
2007
95views more  JSAC 2007»
13 years 9 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
CORR
2004
Springer
162views Education» more  CORR 2004»
13 years 9 months ago
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as ...
Srikant Sharma
WINET
2010
179views more  WINET 2010»
13 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li