Sciweavers

323 search results - page 62 / 65
» Adaptive resource control in 2-hop ad-hoc networks
Sort
View
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
GLOBECOM
2008
IEEE
13 years 8 months ago
On the Impact of Inter-Cell Interference in LTE
—While intercell interference coordination (ICIC) for the downlink of multi-cell systems in general and orthogonal frequency division multiple access (OFDMA) networks in particul...
András Rácz, Norbert Reider, G&aacut...
INFOCOM
2005
IEEE
14 years 1 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
POLICY
2005
Springer
14 years 1 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
DASFAA
2006
IEEE
121views Database» more  DASFAA 2006»
14 years 1 months ago
Distributed Network Querying with Bounded Approximate Caching
Abstract. As networks continue to grow in size and complexity, distributed network monitoring and resource querying are becoming increasingly difficult. Our aim is to design, build...
Badrish Chandramouli, Jun Yang 0001, Amin Vahdat