Sciweavers

28 search results - page 4 / 6
» broadnets 2005
Sort
View
BROADNETS
2005
IEEE
14 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
BROADNETS
2005
IEEE
14 years 3 months ago
A rate adaptation algorithm for ieee 802.11 wlans based on Mac-Layer Loss Differentiation
— In a WLAN subject to variable wireless channel conditions, rate adaptation plays an important role to more efficiently utilize the physical link. However, the existing rate ada...
Qixiang Pang, Victor C. M. Leung, Soung Chang Liew
BROADNETS
2005
IEEE
14 years 3 months ago
Multi layer rules based framework for vertical handoff
— Seamless interoperability between two dissimilar networks require handoff from one network to the other. Such handoffs are known as vertical handoffs. Vertical handoff introduc...
Abhijit Sur, Douglas C. Sicker
BROADNETS
2005
IEEE
14 years 3 months ago
Network design for IP-centric light trail networks
Abstract— We explore network design principles for nextgeneration all-optical wide-area networks, employing light-trail technology. Light-trail [1] is a light-wave circuit that a...
Srivatsan Balasubramanian, Ahmed E. Kamal, Arun K....
BROADNETS
2005
IEEE
14 years 3 months ago
Network selection using fuzzy logic
—The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterize...
Shubha Kher, Arun K. Somani, Rohit Gupta