Sciweavers

2172 search results - page 368 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 6 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung
INFOCOM
2012
IEEE
13 years 4 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
16 years 3 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu
TWC
2010
14 years 9 months ago
Fairness-aware radio resource management in downlink OFDMA cellular relay networks
Abstract-- Relaying and orthogonal frequency division multiple access (OFDMA) are the accepted technologies for emerging wireless communications standards. The activities in many w...
Mohamed Salem, Abdulkareem Adinoyi, Mahmudur Rahma...
MOBICOM
1999
ACM
15 years 6 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins