Sciweavers

34 search results - page 3 / 7
» iscc 2007
Sort
View
ISCC
2007
IEEE
13 years 11 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
ISCC
2007
IEEE
13 years 11 months ago
Composition for Enhanced SIP Presence
Presence has taken shape as a way to present a comprehensive view of the communications capabilities of a user or resource. Standardized protocols allow for receiving presence dat...
Ron Shacham, Wolfgang Kellerer, Henning Schulzrinn...
ISCC
2007
IEEE
104views Communications» more  ISCC 2007»
13 years 11 months ago
Chronicle Recognition for Mobility Management Triggers
An optimally working mobile system requires tight cooperation and an information stream that flows impeccably between its components. This, however, is not the current state of t...
Christophe Dousson, Kostas Pentikousis, Tiia Sutin...
ISCC
2007
IEEE
13 years 11 months ago
Fuzzy Control of Adaptive Timeout for Video Streaming over a Bluetooth Interconnect
Bluetooth’s default ARQ scheme is not well suited to real-time video streaming, resulting in missed display and decode deadlines. Therefore, adaptive ARQ combined with a deadline...
Rouzbeh Razavi, Martin Fleury, Mohammed Ghanbari
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
13 years 11 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...