Sciweavers

704 search results - page 69 / 141
» Resource Access Control for an Internet User Agent
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
WOWMOM
2006
ACM
94views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Performance Analysis and Enhancement of the Next Generation Cellular Networks
— As more and more wireless subscribers access the Internet through cellular networks, Internet data traffic, which is known to be long range dependent (LRD), will soon dominate...
Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
IDMS
1997
Springer
182views Multimedia» more  IDMS 1997»
15 years 2 months ago
mTunnel: A Multicast Tunneling System with a User Based Quality-of-Service Model
Abstract. This paper presents a system, called mTunnel, for application level tunneling of multicast trac in a lightweight manner, where the end-user is responsible for deciding w...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 1 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
WIKIS
2010
ACM
15 years 1 months ago
Deep hypertext with embedded revision control implemented in regular expressions
While text versioning was definitely a part of the original hypertext concept [21, 36, 44], it is rarely considered in this context today. Still, we know that revision control un...
Victor S. Grishchenko