Sciweavers

5723 search results - page 937 / 1145
» Network Management
Sort
View
CCS
2004
ACM
15 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
EMISA
2004
Springer
15 years 10 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
GRID
2004
Springer
15 years 10 months ago
Memory Conscious Task Partition and Scheduling in Grid Environments
While resource management and task scheduling are identified challenges of Grid computing, current Grid scheduling systems mainly focus on CPU and network availability. Recent per...
Ming Wu, Xian-He Sun
ICCSA
2004
Springer
15 years 10 months ago
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism
Mobile IPv6 enables mobile node to roam transparently in any network. It shows good performance for macro mobility but it is not proper for supporting micro mobility because of lar...
Dae Sun Kim, Choong Seon Hong
IWQOS
2004
Springer
15 years 9 months ago
On quality-of-service and energy consumption tradeoffs in FEC-encoded audio streaming
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also ...
Zhinan Zhou, Philip K. McKinley, Seyed Masoud Sadj...