Sciweavers

430 search results - page 59 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
IEEEARES
2010
IEEE
13 years 6 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
LISA
1994
13 years 9 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Role and Emerging Landscape of Data Pools in the Retail and Consumer Goods Industries
In terms of electronic collaboration, the value chains of the retail and consumer goods industries can be ranked among the most advanced. Recent studies have underlined the import...
Jan Schemm, Christine Legner
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 2 months ago
IEEE 802.11-Based Mobile IP Fast Handoff Latency Analysis
— Mobile IP is a solution for mobility support in the global Internet. However, it suffers from long handoff delay. Many solutions have been proposed to reduce the handoff delay ...
Jiang Xie, Ivan Howitt, Izzeldin Shibeika
NOSSDAV
1993
Springer
14 years 2 days ago
A Multimedia Enhanced Transport Service in a Quality of Service Architecture
For applications relying on the transfer of multimedia, and in particular continuous media, it is essential that quality of service (QoS) is guaranteed system-wide, including end-s...
Andrew T. Campbell, Geoff Coulson, David Hutchison