Sciweavers

231 search results - page 20 / 47
» Authentication across heterogeneous networks
Sort
View
89
Voted
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering and middleware: a roadmap
The construction of a large class of distributed systems can be simplified by leveraging middleware, which is layered between network operating systems and application components....
Wolfgang Emmerich
AGENTS
1998
Springer
15 years 1 months ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus
ICC
2007
IEEE
212views Communications» more  ICC 2007»
15 years 4 months ago
Middleware Vertical Handoff Manager: A Neural Network-Based Solution
— – Major research challenges in the next generation of wireless networks include the provisioning of worldwide seamless mobility across heterogeneous wireless networks, the im...
Nidal Nasser, Sghaier Guizani, Eyhab Al-Masri
ICDIM
2007
IEEE
15 years 4 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
AINA
2007
IEEE
15 years 4 months ago
Middleware for Ubiquitous Service-Oriented Spaces on the Web
Web services are todays preferred vehicle for creating service-oriented architectures (SOA). Due to the boom of personal networked devices, the Web also found its way to the mobil...
Geert Vanderhulst, Kris Luyten, Karin Coninx