Sciweavers

2517 search results - page 107 / 504
» The Fairness Challenge in Computer Networks
Sort
View
162
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
137
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Joint Computation and Communication Scheduling to Enable Rich Mobile Applications
Abstract—Increasing interest in sensor networking and ubiquitous computing has created a trend towards embedding more and more intelligence into our surroundings. This enables th...
Shoubhik Mukhopadhyay, Curt Schurgers, Sujit Dey
121
Voted
ISW
2004
Springer
15 years 9 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
117
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Sharing the cost of backbone networks: Simplicity vs. precision
—Internet backbone operators face a trade-off in quantifying the costs that their customers inflict on their infrastructure since the precision of these methods depends on the r...
László Gyarmati, Michael Sirivianos,...
136
Voted
AINA
2009
IEEE
15 years 10 months ago
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks
Carrier Sense Multiple Access / ID Countdown (CSMA/IC) is a collision-free ad hoc MAC protocol. CSMA/IC avoids simultaneous medium access by competing with a local unique ID assig...
Ki-seok Lee, Cheeha Kim