Sciweavers

1498 search results - page 194 / 300
» Collection tree protocol
Sort
View
IMC
2007
ACM
13 years 11 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
USITS
2001
13 years 11 months ago
Fine-Grained Failover Using Connection Migration
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially usefu...
Alex C. Snoeren, David G. Andersen, Hari Balakrish...
IQ
2000
13 years 11 months ago
Improving Information Quality in Loan Approval Processes for Fair Lending and Fair Pricing
: Current banking data management on loan approval processes has great room for improvements of information quality and prevention of data problems in general, but especially with ...
M. Cary Collins, Frank M. Guess
JCM
2007
143views more  JCM 2007»
13 years 10 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
CN
1999
154views more  CN 1999»
13 years 9 months ago
Architectural Considerations in the Design of WDM-Based Optical Access Networks
We describe a WDM-based optical access network architecture for providing broadband Internet services. The architecture uses a passive collection and distribution network and a co...
Eytan Modiano, Richard A. Barry