—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
— This paper introduces a buffer occupancy -based admission control mechanism aimed to counter link congestion while fairly sharing the bandwidth in converged IP and broadcasting...
Yassine Hadjadj Aoul, Abdelhamid Nafaa, Ahmed Meha...
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...