Sciweavers

1000 search results - page 164 / 200
» Application Access Control at Network Level
Sort
View
SSD
2009
Springer
145views Database» more  SSD 2009»
14 years 4 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
COMCOM
2006
121views more  COMCOM 2006»
13 years 10 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
JNCA
2000
117views more  JNCA 2000»
13 years 10 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
12 years 22 days ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
PUC
2000
97views more  PUC 2000»
13 years 10 months ago
Look, Ma, My Homepage is Mobile!
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typic...
Roger Kehr, Andreas Zeidler