Sciweavers

2403 search results - page 442 / 481
» Mobility Support in IPv6
Sort
View
ISCAPDCS
2003
14 years 11 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
WMI
2001
104views more  WMI 2001»
14 years 11 months ago
Pricing differentiated services in the GPRS environment
The General Packet Radio Service extends the existing GSM mobile communications technology by providing packet switching and higher data rates in order to efficiently access IPbas...
Sergios Soursos, Costas Courcoubetis, George C. Po...
ECMDAFA
2008
Springer
118views Hardware» more  ECMDAFA 2008»
14 years 10 months ago
A Metamodeling Approach for Reasoning about Requirements
In requirements engineering, there are several approaches for requirements modeling such as goal-oriented, aspect-driven, and system requirements modeling. In practice, companies o...
Arda Goknil, Ivan Kurtev, Klaas van den Berg
EUROSSC
2008
Springer
14 years 10 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
ADT
2010
14 years 9 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...