Sciweavers

AICT
2006
IEEE
118views Communications» more  AICT 2006»
13 years 11 months ago
Web Service Offerings Language (WSOL) Support for Context Management of Mobile/Embedded XML Web Services
Specification of monitored context properties and their influence on behavior of Web services and management activities is a prerequisite for contextsensitive operation, which is ...
Vladimir Tosic, Hanan Lutfiyya, Yazhe Tang
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 11 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
AICT
2006
IEEE
102views Communications» more  AICT 2006»
13 years 11 months ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
AICT
2006
IEEE
104views Communications» more  AICT 2006»
13 years 11 months ago
An Automation of Mail Channels
Mail channels allow an electronic mail (e-mail) user to have multiple points of contact, each with a potentially different policy. For example, a user may have two channels, one fo...
Nicholas M. Boers, Pawel Gburzynski
AICT
2005
IEEE
157views Communications» more  AICT 2005»
13 years 11 months ago
Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Automatic repeat request (ARQ) schemes are effective to recover non-real-time data corrupted by channel errors, but their use with real-time traffic is seldom considered because p...
Jose A. Afonso, Joaquim E. Neves
MMB
2010
Springer
185views Communications» more  MMB 2010»
13 years 11 months ago
Correctness Issues of Symbolic Bisimulation Computation for Markov Chains
Abstract. Bisimulation reduction is a classical means to fight the infamous state space explosion problem, which limits the applicability of automated methods for verification li...
Ralf Wimmer, Bernd Becker
MMB
2010
Springer
185views Communications» more  MMB 2010»
13 years 11 months ago
Reducing the Cost of Generating APH-Distributed Random Numbers
Phase-type (PH) distributions are proven to be very powerful tools in modelling and analysis of a wide range of phenomena in computer systems. The use of these distributions in sim...
Philipp Reinecke, Miklós Telek, Katinka Wol...
MMB
2010
Springer
180views Communications» more  MMB 2010»
13 years 11 months ago
ResiLyzer: A Tool for Resilience Analysis in Packet-Switched Communication Networks
We present a tool for the analysis of fault-tolerance in packet-switched communication networks. Network elements like links or routers can fail or unexpected traffic surges may o...
David Hock, Michael Menth, Matthias Hartmann, Chri...
MDM
2010
Springer
194views Communications» more  MDM 2010»
13 years 11 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
MDM
2010
Springer
250views Communications» more  MDM 2010»
13 years 11 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...