Sciweavers

922 search results - page 84 / 185
» Fairness, Resources, and Separation
Sort
View
79
Voted
SAC
2002
ACM
14 years 10 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
DAIS
2009
14 years 11 months ago
Dependency Management in Smart Homes
In future smart homes functionality will be provided to the inhabitants by software services decoupled from the underlying hardware devices. While this will enhance flexibility and...
Daniel Retkowitz, Sven Kulle
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 3 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...

Publication
151views
16 years 9 months ago
The OSU Scheme for Congestion Avoidance in ATM Networks: Lessons Learnt and Extensions
The OSU scheme is a rate-based congestion avoidance scheme for ATM networks using explicit rate indication. This work was one of the first attempts to define explicit rate switch m...
Raj Jain, Shiv Kalyanaraman and Ram Viswanathan
WCNC
2008
IEEE
15 years 4 months ago
Providing QoS to Real and Data Applications in WiMAX Mesh Networks
— We consider the problem of centralized routing and scheduling for IEEE 802.16 mesh networks so as to provide Quality of Service (QoS) to individual real and interactive data ap...
Vinod Sharma, A. Anil Kumar, S. R. Sandeep, M. Sid...