Sciweavers

351 search results - page 49 / 71
» Building Secure and Reliable Network Applications
Sort
View
SACMAT
2010
ACM
15 years 6 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
EJWCN
2010
115views more  EJWCN 2010»
14 years 8 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...
CONEXT
2009
ACM
15 years 3 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
AINA
2007
IEEE
15 years 8 months ago
Convergent Online Charging for Context-Aware Mobile Services
Personalized and context-aware services are of high interest for Mobile Network Operators (MNOs) to keep existing and win new subscribers. Although such services are already avail...
Frank Bormann, Stephan Flake, Jürgen Tacken
CONEXT
2006
ACM
15 years 8 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore