Sciweavers

156
Voted
ARCS
2004
Springer
15 years 7 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
ARCS
2004
Springer
15 years 7 months ago
STAFF: State Transition Applied Fast Flash Translation Layer
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption....
Tae-Sun Chung, Stein Park, Myung-Jin Jung, Bumsoo ...
AINTEC
2006
Springer
15 years 7 months ago
Live E! Project: Sensing the Earth
Masaya Nakayama, Satoshi Matsuura, Hiroshi Esaki, ...
AINTEC
2006
Springer
15 years 7 months ago
Modeling Mobility with Behavioral Rules: The Case of Incident and Emergency Situations
Mobility models must scale accordingly to the application and reflect real scenarios in which wireless devices are deployed. Typical examples of scenarios requiring precise mobilit...
Franck Legendre, Vincent Borrel, Marcelo Dias de A...
AINTEC
2006
Springer
15 years 7 months ago
Building Fault Tolerant Networks Using a Multihomed Mobile Router: A Case Study
In this paper, we will build a fault-tolerant network using a Multiple Care-of Addresses registration implementation on NEPL (NEMO Platform for Linux) for the GNU/Linux Operating S...
Romain Kuntz, Jean Lorchat