Sciweavers

1472 search results - page 266 / 295
» Access control in virtual environments
Sort
View
VTC
2007
IEEE
159views Communications» more  VTC 2007»
15 years 6 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
OTM
2007
Springer
15 years 6 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
15 years 5 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
MICRO
2006
IEEE
102views Hardware» more  MICRO 2006»
15 years 5 months ago
Managing Distributed, Shared L2 Caches through OS-Level Page Allocation
This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multi...
Sangyeun Cho, Lei Jin
ICDCS
2005
IEEE
15 years 5 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...