• Aucun résultat trouvé

[PDF] Top 20 A novel service mobility architecture for SIP environments

Has 10000 "A novel service mobility architecture for SIP environments" found on our website. Below are the top 20 most common "A novel service mobility architecture for SIP environments".

A novel service mobility architecture for SIP environments

A novel service mobility architecture for SIP environments

... traffic for a service transfer (heavy data) as depicted in Figures 5a and 5b while creating much more traffic for a service preference data transfer (small data) as depicted in ... Voir le document complet

8

Efficient semantic-based IoT service discovery mechanism for dynamic environments

Efficient semantic-based IoT service discovery mechanism for dynamic environments

... semantic service discovery in a dynamic context and over a hierarchy of semantic ...Within a gateway, we defined an incremental clustering mechanism to create groups of similar ...to a ... Voir le document complet

6

Performance and implementation of UFA : a SIP-based ultra flat mobile network architecture

Performance and implementation of UFA : a SIP-based ultra flat mobile network architecture

... AND MOBILITY PROCEDURES When MN wants to initiate a service with a CN (Corresponding Node), it sends a SIP INVITE message to this CN to create a SIP ...creates ... Voir le document complet

7

Functional architecture for automated vehicles trajectory planning in complex environments

Functional architecture for automated vehicles trajectory planning in complex environments

... still a long way to go before making the transition between automated vehicles ...of a generic modular architecture for automated vehicles motion ...complex environments such as turns, ... Voir le document complet

161

Mobility as a Service (MaaS) : une feuille de route digitale pour les autorités organisatrices

Mobility as a Service (MaaS) : une feuille de route digitale pour les autorités organisatrices

... - Helsinki illustre le modèle d'intégration « bottom-up » réalisé par un acteur privé (MaaS Global) proposant sa propre application (Whim) désormais également disponible dans d'autres villes d’Europe. - Le cas d'Oslo ... Voir le document complet

66

Situation Awareness for Intelligent Mobility in Dynamic Environments IRT Nanoelec Perfect Platform

Situation Awareness for Intelligent Mobility in Dynamic Environments IRT Nanoelec Perfect Platform

... designed for our experimentations is a Renault Zoe equipped with sensors and processing ...Such a small city car was chosen because of its low cost and ease of driving compared to heavy ...future ... Voir le document complet

13

Autonomous Golf Cars for Public Trial of Mobility-on-Demand Service

Autonomous Golf Cars for Public Trial of Mobility-on-Demand Service

... Bookings for trips can be made either at the vehicle itself using a touchscreen interface, or via mobile phone or web ...shown a location map and asked for pick-up and drop-off location, with ... Voir le document complet

9

A Secured Service Level Negotiation In Ubiquitous Environments

A Secured Service Level Negotiation In Ubiquitous Environments

... secure a SOAP message transiting through several Web Services by keeping confidential for some of these WS but not for others, WSS is the ideal solution; because SSL and IPSec provide end-to- end ... Voir le document complet

11

End-to-end security architecture for cloud computing environments

End-to-end security architecture for cloud computing environments

... is a poorly confined device driver in the vir- tualization layer, enabling to bypass resource isolation and take complete infrastruc- ture ...is a framework to build self-defending ...between a ... Voir le document complet

180

On Mobility and Einstein Relation for Tracers in Time-Mixing Random Environments

On Mobility and Einstein Relation for Tracers in Time-Mixing Random Environments

... the mobility coefficient for a tagged particle in a simple symmetric exclusion process with adsorption/desorption of particles, in a presence of an external force field interacting with ... Voir le document complet

21

A novel trust-based authentication scheme for low-resource devices in smart environments

A novel trust-based authentication scheme for low-resource devices in smart environments

... chooses a service, he will be directed to another window that lists the security steps needed to activate that ...the service provider will be calculated, as described in section 3, and the threshold ... Voir le document complet

9

A Novel Architecture For Elementary Check Node Processing In Non-Binary LDPC Decoders

A Novel Architecture For Elementary Check Node Processing In Non-Binary LDPC Decoders

... (CNP) Architecture The CNP can be designed based on the FB architecture ...using a Tree-based structure [33] as illustrated in Fig. 3.b for dc = ...constant for all outputs. For ... Voir le document complet

6

Mobility Management with Caching Policy over SDN Architecture

Mobility Management with Caching Policy over SDN Architecture

... 1) U-QoS: We evaluate the percentage of loss and the transmission time. Packet Loss: The results, as shown in Fig. 4, indicate that both ON-OFF and Adaptive caching policy eliminates the packet loss at all data traffic ... Voir le document complet

9

Home agent architecture and algorithms for mobility management in mobile IP networks

Home agent architecture and algorithms for mobility management in mobile IP networks

... to a higher ratio Execution Time/Processor Speed and num- ber of missed ...So, for configurations with different speeds, the speeds of the processors must follow a Gaussian distribution in order to ... Voir le document complet

7

Mobility Management with Caching Policy over SDN Architecture

Mobility Management with Caching Policy over SDN Architecture

... SDN Mobility, Caching Policy ...be a mix of mobile/wireless devices from different factories, which will lead to a complex ...proposed for the future network to advance a software-based ... Voir le document complet

8

Toward a novel classification-based attack detection and response architecture

Toward a novel classification-based attack detection and response architecture

... consume a high computing power in order to have high ...can a detection system cope with challenges while providing an easy to use and interactive platform? ... Voir le document complet

4

A Novel Security Architecture Based on Multi-level Rule Expression Language

A Novel Security Architecture Based on Multi-level Rule Expression Language

... describe a decision support for IDS system that uses multi-level parameter ...in a Genetic classifier-based ...from a general knowledge ...uses a manager that communicates with ... Voir le document complet

11

An adaptive and context-aware architecture for future pervasive learning environments

An adaptive and context-aware architecture for future pervasive learning environments

... of a priori defined and well structured activities that may be achieved in different ways according to the current situation; ii) Recommendation of activities and learning ressources according to the current ... Voir le document complet

6

A Model-Driven approach for Collaborative Service-Oriented Architecture design

A Model-Driven approach for Collaborative Service-Oriented Architecture design

... Model for Service-Oriented Architecture) (Benguria et ...develop a metamodel for SOA. This metamodel consists of a set of essential aspects for ...provides a set of ... Voir le document complet

48

A Unified Formal Model for Service Oriented Architecture to Enforce Security Contracts

A Unified Formal Model for Service Oriented Architecture to Enforce Security Contracts

... work A wide variety of formal models exists for service-oriented ...models for expressing and analyzing service based-systems, [10], or models for giving a formal semantic ... Voir le document complet

3

Show all 10000 documents...