Sciweavers

1140 search results - page 166 / 228
» A Purpose-Based Access Control Model
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
INFOCOM
2007
IEEE
14 years 2 months ago
Millimeter Wave WPAN: Cross-Layer Modeling and Multi-Hop Architecture
— The 7 GHz of unlicensed spectrum in the 60 GHz band offers the potential for multiGigabit indoor wireless personal area networking (WPAN). With recent advances in the speed of ...
Sumit Singh, Federico Ziliotto, Upamanyu Madhow, E...
COMCOM
2006
121views more  COMCOM 2006»
13 years 8 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
SPAA
2006
ACM
14 years 1 months ago
Playing push vs pull: models and algorithms for disseminating dynamic data in networks
Consider a network in which a collection of source nodes maintain and periodically update data objects for a collection of sink nodes, each of which periodically accesses the data...
R. C. Chakinala, Abishek Kumarasubramanian, Kofi A...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 9 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu