Sciweavers

95 search results - page 12 / 19
» Authenticated Access to Reserved Network Resources
Sort
View
CLUSTER
2002
IEEE
15 years 2 months ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
CORR
2008
Springer
120views Education» more  CORR 2008»
14 years 9 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal
KIVS
2001
Springer
15 years 2 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
CN
1999
98views more  CN 1999»
14 years 9 months ago
Managing application level quality of service through TOMTEN
With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
R. De Silva, Björn Landfeldt, Sebastien Ardon...
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...