Sciweavers

294 search results - page 44 / 59
» Network externality and future usage of Internet services
Sort
View
ICSNC
2007
IEEE
15 years 6 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
PERCOM
2010
ACM
14 years 10 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
INFOCOM
2008
IEEE
15 years 6 months ago
Cell Selection in 4G Cellular Networks
—Cell selection is the process of determining the cell(s) that provide service to each mobile station. Optimizing these processes is an important step towards maximizing the util...
David Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabr...
COMSWARE
2008
IEEE
15 years 6 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
QOFIS
2000
Springer
15 years 3 months ago
On the Feasibility of RSVP as General Signalling Interface
Much debate exists whether explicit signalling is eventually required to create a reliable and integrated multi-service Internet. If yes, further disagreement exists, how such sign...
Martin Karsten, Jens Schmitt, Nicole Beriér...