Sciweavers

1440 search results - page 9 / 288
» Third-Party Flow Control
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
15 years 2 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
112
Voted
JNW
2008
129views more  JNW 2008»
15 years 2 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
SIGKDD
2008
107views more  SIGKDD 2008»
15 years 2 months ago
A privacy-aware trajectory tracking query engine
Advances in telecommunications and GPS sensors technology have made possible the collection of data like time series of locations, related to the movement of individuals. The anal...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
118
Voted
CCR
2004
100views more  CCR 2004»
15 years 2 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner
103
Voted
FGCS
2010
99views more  FGCS 2010»
15 years 1 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein