Sciweavers

231 search results - page 25 / 47
» Authentication across heterogeneous networks
Sort
View
80
Voted
MOBISYS
2005
ACM
15 years 9 months ago
Horde: separating network striping policy from mechanism
Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping syste...
Asfandyar Qureshi, John V. Guttag
DAIS
2003
14 years 11 months ago
Planning for Network-Aware Paths
Communication in distributed applications across a wide area network needs to cope with heterogenous and constantly changing network conditions. A promising approach to address thi...
Xiaodong Fu, Vijay Karamcheti
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 1 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
83
Voted
PERCOM
2004
ACM
15 years 9 months ago
MediaBroker: An Architecture for Pervasive Computing
We present MediaBroker, a distributed framework designed to support pervasive computing applications. Specifically, we propose an architecture consisting of a transport engine and...
Martin Modahl, Ilya Bagrak, Matthew Wolenetz, Phil...
GLOBECOM
2006
IEEE
15 years 3 months ago
Analysis of the Effect of Mobile Terminal Speed on WLAN/3G Vertical Handovers
— WLAN hot-spots are becoming widely spread. This, combined with the availability of new multi-mode terminals integrating heterogeneous technologies, opens new business opportuni...
Telemaco Melia, Antonio de la Oliva, Ignacio Soto,...