Sciweavers

231 search results - page 11 / 47
» Authentication across heterogeneous networks
Sort
View
ADT
2010
14 years 9 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
HCW
1999
IEEE
15 years 1 months ago
Adaptive Distributed Applications on Heterogeneous Networks
Distributed applications execute in environments that can include different network architectures as well as a range of compute platforms. Furthermore, these resources are shared ...
Thomas R. Gross, Peter Steenkiste, Jaspal Subhlok
GLOBECOM
2010
IEEE
14 years 7 months ago
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...
IPPS
2002
IEEE
15 years 2 months ago
Characterizing NAS Benchmark Performance on Shared Heterogeneous Networks
The goal of this research is to develop performance profiles of parallel and distributed applications in order to predict their execution time under different network conditions....
Jaspal Subhlok, Shreenivasa Venkataramaiah, Amitoj...
79
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
A Cognitive Framework for Improving Coexistence Among Heterogeneous Wireless Networks
—The proliferation of wireless systems requires that the coexistence between heterogeneous technologies be addressed. This paper presents a cognitive framework in which sensingba...
Stefan Geirhofer, Lang Tong, Brian M. Sadler