Sciweavers

7047 search results - page 1316 / 1410
» Focusing on Binding and Computation
Sort
View
LOCA
2009
Springer
14 years 4 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
OTM
2009
Springer
14 years 4 months ago
The Constellation Query Language
Collaboration in modeling is essential to success, but ORM diagrams intimidate many business people, and most would never install an ORM modeling tool on their computers. The Const...
Clifford Heath
IMC
2009
ACM
14 years 4 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
IMC
2009
ACM
14 years 4 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
MOBILITY
2009
ACM
14 years 4 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat
« Prev « First page 1316 / 1410 Last » Next »