Sciweavers

APNOMS
2006
Springer
15 years 7 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
APNOMS
2006
Springer
15 years 7 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
APNOMS
2006
Springer
15 years 7 months ago
Rate-Based and Gap-Based Available Bandwidth Estimation Techniques in Cross-Traffic Context
Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few year...
Wayman Tan, Marat Zhanikeev, Yoshiaki Tanaka
APNOMS
2006
Springer
15 years 7 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
112
Voted
APNOMS
2006
Springer
15 years 7 months ago
SOA-Based Next Generation OSS Architecture
In convergence telecommunication environment, Business Agility plays very important role in the OSS(Operation Support System) when telco provide new merged services to customer on ...
Young-Wook Woo, Daniel W. Hong, Seong-Il Kim, Byun...