Sciweavers

7329 search results - page 1386 / 1466
» Network Extractor Protocols
Sort
View
ICDCSW
2002
IEEE
15 years 8 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
124
Voted
ICPP
2002
IEEE
15 years 8 months ago
Linux/SimOS - A Simulation Environment for Evaluating High-Speed Communication Systems
This paper presents Linux/SimOS, a Linux operating system port to SimOS, which is a complete machine simulator from Stanford. The motivation for Linux/SimOS is to alleviate the li...
Chulho Won, Ben Lee, Chansu Yu, Sangman Moh, Yong-...
116
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Impromptu Measurement Infrastructures using RTP
— Dedicated infrastructures for end-to-end measurements are complex to deploy and manage. Equipment cost, the requirements for reporting bandwidth, and the administrative diversi...
Ramón Cáceres, Nick G. Duffield, Tim...
MSE
2002
IEEE
119views Hardware» more  MSE 2002»
15 years 8 months ago
Narnia: A Virtual Machine for Multimedia Communication Services
Narnia is middleware that helps programmers build multimedia communication services. This middleware ollection of familiar programming abstractions— including events, event hand...
Mauricio Cortes, J. Robert Ensor
SACMAT
2010
ACM
15 years 8 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
« Prev « First page 1386 / 1466 Last » Next »