Sciweavers

2813 search results - page 429 / 563
» Formalizing Architectural Connection
Sort
View
113
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
ISCC
2009
IEEE
136views Communications» more  ISCC 2009»
15 years 10 months ago
Design and evaluation of a BitTorrent proxy for energy saving
Recent studies indicate that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. The largest c...
Giuseppe Anastasi, Marco Conti, Ilaria Giannetti, ...
124
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Network Bandwidth Allocation via Distributed Auctions with Time Reservations
—This paper studies the problem of allocating network capacity through periodic auctions. Motivated primarily by a service overlay architecture, we impose the following condition...
Pablo Belzarena, Andrés Ferragut, Fernando ...
115
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Live Social Semantics
Abstract. Social interactions are one of the key factors to the success of conferences and similar community gatherings. This paper describes a novel application that integrates da...
Harith Alani, Martin Szomszor, Ciro Cattuto, Woute...
114
Voted
IWCMC
2009
ACM
15 years 10 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth