Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
: In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the sign...
Nikolaos H. Loukas, Nikos I. Passas, Lazaros F. Me...
Over the last few years, novel architectures like ad hoc and sensor networks have introduced new challenges in the way the communication infrastructure must be addressed. Unlike t...
Peter Gober, Artur Ziviani, Petia Todorova, Marcel...
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
We consider software transactional memory (STM) concurrency control for multicore real-time software, and present a novel contention manager (CM) for resolving transactional conï¬...