Sciweavers

299 search results - page 52 / 60
» Transaction Policies for Mobile Networks
Sort
View
CASES
2005
ACM
13 years 10 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 8 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
ICPPW
2003
IEEE
14 years 1 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
IPCCC
2005
IEEE
14 years 2 months ago
Real time agreement protocol and resource pre-reservation for wireless system
The third generation of mobile networks aims to offer services diversified to users, while guaranteeing acceptable QoS. This results in the setting up of strategies of increasingl...
Sonia Ben Rejeb, Sami Tabbane, Zièd Choukai...
IAJIT
2007
150views more  IAJIT 2007»
13 years 8 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...