Sciweavers

308 search results - page 36 / 62
» On implementing security at the transport layer
Sort
View
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
15 years 4 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...
INFOCOM
2007
IEEE
15 years 3 months ago
Optimization Based Rate Control for Multicast with Network Coding
— Recent advances in network coding have shown great potential for efficient information multicasting in communication networks, in terms of both network throughput and network ...
Lijun Chen, Tracey Ho, Steven H. Low, Mung Chiang,...
DOA
2001
132views more  DOA 2001»
14 years 11 months ago
Mobile RMI: Supporting Remote Access to Java Server Objects on Mobile Hosts
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
Tom Wall, Vinny Cahill
BPSC
2009
184views Business» more  BPSC 2009»
14 years 10 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
ICSOC
2009
Springer
15 years 2 months ago
Message-Oriented Middleware with QoS Awareness
Publish/subscribe messaging is a fundamental mechanism for interconnecting disparate services and systems in the service-oriented computing architecture. The quality of services (Q...
Hao Yang, Minkyong Kim, Kyriakos Karenos, Fan Ye, ...