Sciweavers

623 search results - page 57 / 125
» Declarative Network Verification
Sort
View
MOBICOM
2010
ACM
13 years 9 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
TGC
2007
Springer
14 years 2 months ago
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
Abstract. We propose and discuss foundations for programmable overlay networks and overlay computing systems. Such overlays are built over a large number of distributed computation...
Luigi Liquori, Michel Cosnard
GI
2009
Springer
13 years 6 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
AIMS
2010
Springer
13 years 10 months ago
Model-Driven Service Level Management
Service-level agreements (SLA) definition and monitoring are open issues within the IT Service Management (ITSM) domain. Our main goals are to propose a model-based approach to IT ...
Anacleto Correia, Fernando Brito e Abreu
MOBIHOC
2002
ACM
14 years 8 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...