Sciweavers

6348 search results - page 194 / 1270
» Extensible control architectures
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
ICC
1997
IEEE
155views Communications» more  ICC 1997»
15 years 8 months ago
Design of Call Control Signaling in Wireless ATM Networks
: In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the sign...
Nikolaos H. Loukas, Nikos I. Passas, Lazaros F. Me...
AHSWN
2005
171views more  AHSWN 2005»
15 years 4 months ago
Topology Control and Localization in Wireless Ad Hoc and Sensor Networks
Over the last few years, novel architectures like ad hoc and sensor networks have introduced new challenges in the way the communication infrastructure must be addressed. Unlike t...
Peter Gober, Artur Ziviani, Petia Todorova, Marcel...
CP
2010
Springer
15 years 3 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
DAC
2012
ACM
13 years 6 months ago
STM concurrency control for embedded real-time software with tighter time bounds
We consider software transactional memory (STM) concurrency control for multicore real-time software, and present a novel contention manager (CM) for resolving transactional conï¬...
Mohammed El-Shambakey, Binoy Ravindran