Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Abstract— The Medium Access Control (MAC) scheme proposed by DAVIC/DVB, IEEE 802.14 and DOCSIS for the upstream channel of Hybrid Fiber Coaxial (HFC) access networks is based on ...
Mark Van den Broek, Ivo J. B. F. Adan, Saishankar ...
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...