Sciweavers

988 search results - page 166 / 198
» A Network Service Access Control Framework Based on Network ...
Sort
View
CF
2004
ACM
14 years 1 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
INFOCOM
2009
IEEE
14 years 2 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
RIVF
2007
13 years 9 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
ICDCS
2007
IEEE
13 years 11 months ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal
CORR
2011
Springer
182views Education» more  CORR 2011»
13 years 2 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...