Sciweavers

849 search results - page 139 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
125
Voted
NETWORK
2006
218views more  NETWORK 2006»
15 years 11 days ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
ICC
2009
IEEE
14 years 10 months ago
OFDMA-TDD Networks with Busy Burst Enabled Grid-of-Beam Selection
Abstract--Interference aware user scheduling in fixed gridof-beam (GoB) transmission is envisaged to significantly benefit from the receiver initiated busy burst (BB) protocol. Fix...
Birendra Ghimire, Gunther Auer, Harald Haas
SRDS
2006
IEEE
15 years 6 months ago
Satem: Trusted Service Code Execution across Transactions
Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the...
Gang Xu, Cristian Borcea, Liviu Iftode
DCOSS
2005
Springer
15 years 6 months ago
Design of Adaptive Overlays for Multi-scale Communication in Sensor Networks
In wireless sensor networks, energy and communication bandwidth are precious resources. Traditionally, layering has been used as a design principle for network stacks; hence routin...
Santashil PalChaudhuri, Rajnish Kumar, Richard G. ...
JSW
2006
71views more  JSW 2006»
15 years 11 days ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello