نتایج جستجو برای: access network

تعداد نتایج: 953073  

2008
Yi Chen Xi Li Richard Schelb Carmelita Görg Andreas Timm-Giel

This paper investigates the potential impacts caused by Call Admission Control (CAC) mechanism of the air interface on simulations carried out for the transport network domain of UMTS Radio Access Network. Independent from the TNL CAC mechanism of the transport network which is in charge of Iub link bandwidth, the Radio CAC function deals with the highly non-linear resources needed for an attem...

Journal: :CoRR 2017
J. Aaron Pendergrass Sarah Helble John Clemens Peter Loscocco

Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. To best support these technologies, next generation systems must provide a centralized service for securely selecting, collecting, and evaluating integrity measurements. Centralization of M&A avoids duplication, minimizes security risks to the system, and ensu...

Journal: :IEICE Transactions 2008
Soodesh Buljore Markus Muck Patricia Martigne Paul Houzé Hiroshi Harada Kentaro Ishizu Oliver Holland Andrej Mihailovic Kostas Tsagkaris Oriol Sallent Gary Clemo Mahesh Sooriyabandara Vladimir Ivanov Klaus Nolte Makis Stametalos

The Project Authorization Request (PAR) for the IEEE P1900.4 Working Group (WG), under the IEEE Standards Coordinating Committee 41 (SCC41) was approved in December 2006, leading to this WG being officially launched in February 2007 [1]. The scope of this standard is to devise a functional architecture comprising building blocks to enable coordinated network-device distributed decision making, ...

Journal: :CoRR 2017
Bin Han Oliver Holland Vincenzo Sciancalepore Mischa Dohler Hans D. Schotten

Massive Machine-Type Communications (mMTC) presents significant challenges in terms of the number of devices accessing the shared resource, and coordination among those devices. This paper overviews work on RAN congestion control in order to better manage resources in the context of device-to-device (D2D) interaction among the MTCDs. It then proceeds to introduce a novel grouping-assisted rando...

2007
Ravi Sahita Uday Savagaonkar Prashant Dewan David Durham

Malicious root-kits modify the in-memory state of programs executing on an endpoint to hide themselves from security software. Such attacks negatively affect network-based security frameworks that depend on the trustworthiness of endpoint software. In network access control frameworks this issue is called the lying-endpoint problem, where a compromised endpoint spoofs software integrity reports...

Journal: :Computers & Security 2011
Barbara Carminati Elena Ferrari Raymond Heatherly Murat Kantarcioglu Bhavani M. Thuraisingham

The existence of online social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, security and privacy concerns need to be addressed for creating such applications. Improving social network access control systems appears as the first step toward addressing the existing ...

2009
David M. Nicol William H. Sanders Sankalp Singh Mouna Seri

With the nation’s increasing awareness of the importance of securing the computer/communication infrastructure of process control systems (PCS), recommendations for their configuration have appeared, most notably NIST Special Publication SP-800-82 [1]. Some of these recommendations concern network connectivity, specifically describing near isolation of some subnetworks from the PCS. Security me...

Journal: :CoRR 2013
Omar Khattab Omar Alani

Two mechanisms have been proposed independently by IEEE and 3GPP; namely, Media Independent Handover (MIH) and Access Network Discovery and Selection Function (ANDSF), respectively. These mechanisms enable a seamless Vertical Handover (VHO) between the different types of technologies (3GPP and non-3GPP), such as GSM (Global System for Mobile Communication), Wireless Fidelity (WiFi), Worldwide I...

Journal: مدیریت شهری 2015
Hosein Esmaili Sangari, Vahid Eilaee,

This long-lasting point in his life due to economic developments, social and cultural development of the Industrial Revolution, the foundation has been transformed. Today, the need for rehabilitation and restoration of these islands what the city increases, the need to develop a coherent and logical connection between the old and new areas to preserve and enhance the integrity and identity of...

Journal: :Computer Networks 2010
Navid Ghazisaidi Martin Maier

Hybrid Fiber-Wireless (FiWi) networks become rapidly mature and represent a promising candidate for reducing power consumption, costs, and bandwidth bottlenecks of next-generation broadband access networks. Two key FiWi technologies with similar design goals are Ethernet Passive Optical Network (EPON) and WiMAX. In this paper, we develop a powerful and flexible techno-economic analysis to compa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید