Sciweavers

472 search results - page 79 / 95
» Evaluating the Performance of Web Services Composition for N...
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices
— In IEEE 802.11 wireless networks, EDCA users’ performance may be degraded because of the existence of legacy users and therefore would get a lower priority service. Such effe...
Haithem Al-Mefleh, J. Morris Chang
ICDCS
2006
IEEE
14 years 1 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
INFOCOM
2012
IEEE
11 years 10 months ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
MDM
2010
Springer
194views Communications» more  MDM 2010»
13 years 9 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...