Sciweavers

1320 search results - page 91 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
JSAC
2006
137views more  JSAC 2006»
15 years 20 days ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
108
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
101
Voted
ISCC
2005
IEEE
109views Communications» more  ISCC 2005»
15 years 6 months ago
From Mobility Management to Connectivity Management
This position paper presents the trend of the research focus transition from mobility management to connectivity management, for the emerging pervasive and ubiquitous computing pa...
Jun-Zhao Sun, Jaakko J. Sauvola
VTC
2008
IEEE
125views Communications» more  VTC 2008»
15 years 7 months ago
Wireless Broadband Services using Smart Caching
— Broadband access for all will be a key functionality in future mobile radio networks. Depending on the length and the characteristic of the radio wave propagation the performan...
Stephan Goebbels
DAC
2000
ACM
15 years 5 months ago
System design of active basestations based on dynamically reconfigurable hardware
– This paper describes the system design and implementation of Active Basestations, a novel application of the run-time reconfigurable hardware technology whose applications have...
Athanassios Boulis, Mani B. Srivastava