Sciweavers

505 search results - page 52 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
JCIT
2008
245views more  JCIT 2008»
13 years 7 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 9 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu
VTC
2010
IEEE
110views Communications» more  VTC 2010»
13 years 6 months ago
Internet Access Performance in LTE TDD
The Time Division Duplex (TDD) uplink-downlink configuration of the 3GPP Long Term Evolution (LTE) determines how the ten subframes in a radio frame are divided between the downlin...
Riikka Susitaival, Henning Wiemann, J. Ostergaard,...
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
WWW
2005
ACM
14 years 8 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...