Sciweavers

738 search results - page 89 / 148
» Comparison of Approaches to Service Deployment
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...
FGCS
2008
159views more  FGCS 2008»
13 years 8 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
PERCOM
2009
ACM
14 years 3 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
ICCNMC
2005
Springer
14 years 2 months ago
Semantic Sensor Net: An Extensible Framework
Existing approaches for sensor networks suffer from a number of critical drawbacks. First, homogeneous deployments have been commonly assumed, but in practice multiple deployments ...
Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qion...
JNCA
2008
117views more  JNCA 2008»
13 years 8 months ago
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
OPNET is a powerful network design and simulation tool that has gained popularity in industry and academia. However, there exists no known simulation approach on how to deploy a p...
Khaled Salah, Prasad Calyam, M. I. Buhari