Sciweavers

8772 search results - page 1733 / 1755
» Business Services Networks
Sort
View
CCS
2004
ACM
14 years 2 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
14 years 2 months ago
Efficacy and Sustainability of a Telerehabilitation Program
Efficacy and Sustainability of a Telerehabilitation Program Sustainability and appropriateness of care are important components for healthcare systems as they begin integrating te...
Cynthia Scheideman-Miller, Pamela G. Clark, Al Moo...
ICDCSW
2003
IEEE
14 years 2 months ago
CATP: A Context-Aware Transportation Protocol for HTTP
— The rendering mechanism used in Web browsers have a significant impact on the user behavior and delay tolerance of retrieval. The head-of-line blocking phenomena prevents the ...
Huamin Chen, Prasant Mohapatra
LCN
2003
IEEE
14 years 2 months ago
Improving the Aggregate Throughput of Access Points in IEEE 802.11 Wireless LANs
In IEEE 802.11 wireless LANs, the DCF access method and the PCF access method operate alternatively within a superframe to service the time-varying traffic demands. Due to differ...
X. James Dong, Mustafa Ergen, Pravin Varaiya, Anuj...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 2 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
« Prev « First page 1733 / 1755 Last » Next »