Sciweavers

PDCAT
2005
Springer
14 years 5 months ago
A Scalable Security Architecture for Grid
Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
PDCAT
2005
Springer
14 years 5 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
PDCAT
2005
Springer
14 years 5 months ago
An Agile Programming Model for Grid End Users
Grid and service computing technologies have been explored by enterprises to promote integration, sharing, and collaboration. However, quick response to business environment chang...
Zhiwei Xu, Chengchun Shu, Haiyan Yu, Haozhi Liu
PDCAT
2005
Springer
14 years 5 months ago
LRC-RED: A Self-tuning Robust and Adaptive AQM Scheme
In this paper, we propose a novel active queue management (AQM) scheme based on the Random Early Detection (RED) of the loss ratio and the total sending rate control, called LRC-R...
Naixue Xiong, Yan Yang, Xavier Défago, Yanx...
PDCAT
2005
Springer
14 years 5 months ago
Optimal Routing in a Small-World Network
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...
Jianyang Zeng, Wen-Jing Hsu
PDCAT
2005
Springer
14 years 5 months ago
A New Algorithm to Solve Synchronous Consensus for Dependent Failures
Fault tolerant algorithms are often designed under the t-out-of-n assumption, which is based on the assumption that all processes or components fail independently with equal proba...
Jun Wang, Min Song
PDCAT
2005
Springer
14 years 5 months ago
On-Line Routing in WDM-TDM Switched Optical Mesh Networks
This paper considers the on-line traffic grooming problem in WDM-TDM switched optical mesh networks without wavelength conversion capability. The objective is to efficiently rou...
Arun Vishwanath, Weifa Liang
PDCAT
2005
Springer
14 years 5 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski