Sciweavers

3899 search results - page 729 / 780
» Argumentation for Access Control
Sort
View
COMSWARE
2007
IEEE
14 years 2 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 2 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...
ICPP
2007
IEEE
14 years 2 months ago
Integrating Memory Compression and Decompression with Coherence Protocols in Distributed Shared Memory Multiprocessors
Ever-increasing memory footprint of applications and increasing mainstream popularity of shared memory parallel computing motivate us to explore memory compression potential in di...
Lakshmana Rao Vittanala, Mainak Chaudhuri
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung