Sciweavers

828 search results - page 75 / 166
» Access Control in Location-Based Services
Sort
View
PE
2008
Springer
113views Optimization» more  PE 2008»
14 years 9 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
ICNP
2003
IEEE
15 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
15 years 11 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
SAINT
2005
IEEE
15 years 3 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 4 months ago
Power Control in Cognitive Radio Systems Based on Spectrum Sensing Side Information
— Cognitive radio has been recently proposed as a promising technology to improve the spectrum utilization efficiency by intelligently sensing and accessing some vacant bands of...
Karama Hamdi, Wei Zhang, Khaled Ben Letaief