Sciweavers

13007 search results - page 2375 / 2602
» Wireless and Mobile Networking
Sort
View
DPD
2007
165views more  DPD 2007»
13 years 9 months ago
Context-based caching and routing for P2P web service discovery
In modern heterogeneous environments, such as mobile, pervasive and ad-hoc networks, architectures based on web services offer an attractive solution for effective communication a...
Christos Doulkeridis, Vassilis Zafeiris, Kjetil N&...
JPDC
2007
84views more  JPDC 2007»
13 years 9 months ago
Distributed average consensus with least-mean-square deviation
We consider a stochastic model for distributed average consensus, which arises in applications such as load balancing for parallel processors, distributed coordination of mobile a...
Lin Xiao, Stephen P. Boyd, Seung-Jean Kim
TWC
2008
176views more  TWC 2008»
13 years 9 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
INFORMATICALT
2002
131views more  INFORMATICALT 2002»
13 years 9 months ago
An Agent-Based Architecture for Customer Services Management and Product Search
The amount of products and services available over the Internet increases significantly and it soon becomes beyond users ability to analyze and compare them. At the same time the n...
Thomas Heiberg, Mihhail Matskin, Jøran Pede...
RE
2002
Springer
13 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
« Prev « First page 2375 / 2602 Last » Next »