Sciweavers

3641 search results - page 635 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
PC
2007
112views Management» more  PC 2007»
13 years 7 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
HPCC
2010
Springer
13 years 6 months ago
Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in ...
Roland Bless, Martin Röhricht
TWC
2010
13 years 2 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
WMTE
2006
IEEE
14 years 2 months ago
The Focus Problem in Mobile Learning
Mobile learning has a lot of potential for supporting learning in situations such as in a museum, at a tourist sight or when exploring biological phenomena at a riverside. There l...
Christoph Göth, Dirk Frohberg, Gerhard Schwab...