Now showing items 361-367 of 367
What is correctness of security protocols?
As soon as major protocol flaws were discovered empirically — a good luck that is not older than the early 1990s — this title question came up to the world. It was soon realised that some notion of formal correctness was ...
Investigation for SS7 signaling monitoring system expansion.
(Jilin Institute of Communications., 2008)
Using Event Calculus for Behaviour Reasoning and Assistance in a Smart Home
Smart Homes (SH) have emerged as a viable solution capable of providing assistive living for the elderly and disabled. Nevertheless, it still remains a challenge to assist the inhabitants of a SH in performing the correct ...
Using Personalized Knowledge Portal for Information and Knowledge Integrating and Sharing
This paper introduces a personalized knowledge portal based approach to information and knowledge integration and sharing which combines the strengths of the Semantic Web and the advantages of collaborative tagging. The ...
End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management
High speed downlink packet access (HSDPA) was introduced to UMTS radio access segment to provide higher capacity for new packet switched services. As a result, packet switched sessions with multiple diverse traffic flows ...