Sciweavers

AINA
2006
IEEE
14 years 6 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
AINA
2006
IEEE
14 years 6 months ago
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Lijun Liao, Mark Manulis
AINA
2006
IEEE
14 years 6 months ago
Home Appliance Translator for Remote Control of Conventional Home Appliance
Abstract— We developed the HAT (Home Appliance Translator) and HAT-Sub to enable conventional appliances without telecommunication capabilities to connect to home networks. The d...
Hiroshi Kuriyama, Hiroshi Mineno, Tadanori Mizuno,...
AINA
2006
IEEE
14 years 6 months ago
DLB: A Novel Real-time QoS Control Mechanism for Multimedia Transmission
This paper presents a new QoS guarantee scheme called R-(m,k)-firm (Relaxed-(m,k)-firm) which provides the guarantee on transmission delay of at least m out of any k consecutive p...
Jian Li, Yeqiong Song
AINA
2006
IEEE
14 years 6 months ago
An Alternative Approach to Multi-Path Forwarding on IPv6 Networks
Abstract—This paper proposes a novel technique to enable flow-level multi-path forwarding on IPv6 networks. Generally on such networks, any packet from a node is forwarded towar...
Hideaki Imaizumi, Hiroyuki Morikawa, Osamu Nakamur...
AINA
2006
IEEE
14 years 6 months ago
Model-based Management of Embedded Service Systems - An Applied Approach
The automatic integration of devices into dynamic, automatically configured networks alone does not take advantage of the entire potential of Service Oriented Architectures (SOA)...
Stefan Illner, Heiko Krumm, Ingo Lück, Andre ...
AINA
2006
IEEE
14 years 6 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
AINA
2006
IEEE
14 years 6 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
AINA
2006
IEEE
14 years 6 months ago
Bandwidth allocation and pricing in multimode network
This paper presents adaptive resource sharing model that uses a revenue criterion to allocate network resources in an optimal way. The model ensures QoS requirements of data flow...
Jyrki Joutsensalo, Ari Viinikainen, Mika Wikstr&ou...
AINA
2006
IEEE
14 years 6 months ago
Modeling, Predicting and Optimizing Redistribution between Clusters on Low Latency Networks
In this paper we study the problem of scheduling messages between two parallel machines connected by a low latency network during a data redistribution. We compare two approaches....
Emmanuel Jeannot, Frédéric Wagner