Sciweavers

738 search results - page 99 / 148
» Comparison of Approaches to Service Deployment
Sort
View
RIDE
2002
IEEE
14 years 1 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
GI
2001
Springer
14 years 1 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
SIGCOMM
2000
ACM
14 years 1 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
WOWMOM
2000
ACM
86views Multimedia» more  WOWMOM 2000»
14 years 1 months ago
Real-time prioritized call admission control in a base station scheduler
With the deployment of packetized wireless networks, the need for Quality of Service is becoming increasingly important. In order for QoS to be implemented and e ciently supported...
Jay R. Moorman, John W. Lockwood, Sung-Mo Kang
EUROSSC
2006
Springer
14 years 11 days ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic