Sciweavers

1147 search results - page 151 / 230
» Transformation of Access Rights
Sort
View
COMCOM
2004
177views more  COMCOM 2004»
13 years 10 months ago
Analysis of SIP-based mobility management in 4G wireless networks
Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks. Because of the transparency...
Nilanjan Banerjee, Wei Wu, Kalyan Basu, Sajal K. D...
COMCOM
2004
84views more  COMCOM 2004»
13 years 10 months ago
A dynamic pricing scheme for e-content at multiple levels-of-service
Businesses selling multimedia rich software or e-content are growing in the Internet. The e-content can be downloaded or streamed immediately after an on-line transaction. Since I...
Srinivasan Jagannathan, Kevin C. Almeroth
CSI
2004
186views more  CSI 2004»
13 years 10 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
ADHOC
2007
134views more  ADHOC 2007»
13 years 10 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
COMCOM
2007
145views more  COMCOM 2007»
13 years 10 months ago
Jointly rate and power control in contention based MultiHop Wireless Networks
This paper presents a new algorithm for jointly optimal control of session rate, link attempt rate, and link power in contention based MultiHop Wireless Networks. Formulating the ...
Abdorasoul Ghasemi, Karim Faez