Sciweavers

95 search results - page 10 / 19
» Authenticated Access to Reserved Network Resources
Sort
View
98
Voted
GLOBECOM
2007
IEEE
15 years 3 months ago
Voice Service Support in Mobile Ad Hoc Networks
— Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access con...
Hai Jiang, Ping Wang, H. Vincent Poor, Weihua Zhua...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 4 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
GRID
2004
Springer
15 years 3 months ago
MARS: A Metascheduler for Distributed Resources in Campus Grids
Computational grids are increasingly being deployed in campus environments to provide unified access to distributed and heterogeneous resources such as clusters, storage arrays, ...
Abhijit Bose, Brian Wickman, Cameron Wood
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
AP2PS
2009
IEEE
15 years 4 months ago
FLaCoSt: A Novel Peer to Peer Architecture for Video Streaming in a Next Generation Network
Abstract—This paper proposes a peer-to-peer video streaming delivery system within the framework of Next Generation Networks using Application Level Multicast. Increased efficie...
Jaime García-Reinoso, Alex Bikfalvi, Iv&aac...