Sciweavers

359 search results - page 34 / 72
» comcom 2008
Sort
View
COMCOM
1999
73views more  COMCOM 1999»
14 years 9 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
COMCOM
2004
114views more  COMCOM 2004»
14 years 9 months ago
WFI optimized PWGPS for wireless IP networks
The worst-case fairness index (WFI) has proved to be an important metric in the provision of fairness and bounded delay in both wired and wireless networks. A feature of wireless l...
Fei Xiang, Alan Marshall, Junzhou Luo
74
Voted
COMCOM
2000
95views more  COMCOM 2000»
14 years 9 months ago
Protocols and architecture for managing TCP/IP network infrastructures
With their increased power and versatility, today's computer networks are becoming used for an ever-growing number of diverse applications. Further, the networking structures...
A. King, R. Hunt
COMCOM
2004
99views more  COMCOM 2004»
14 years 9 months ago
Performance analysis of a mobile communication network: the tandem case
This paper investigates mobile communication networks consisting of N-cells in tandem. Two models with fixed channel assignment are considered, which correspond to (A) a uni-direc...
Attahiru Sule Alfa, Bin Liu
COMCOM
2007
106views more  COMCOM 2007»
14 years 9 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis