Sciweavers

544 search results - page 73 / 109
» Governed Content Distribution on DHT Based Networks
Sort
View
EUC
2006
Springer
13 years 11 months ago
Prediction Efficiency in Predictive p-CSMA/CD
Predictive p-persistent CSMA protocol is an important MAC solution developed for networked sensor/control applications and used in Local Operating Networks (LonWorks) technology. T...
Marek Miskowicz
INFOCOM
2012
IEEE
11 years 10 months ago
Comparing alternative approaches for networking of named objects in the future Internet
Abstract—This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme prop...
Akash Baid, Tam Vu, Dipankar Raychaudhuri
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ECTEL
2006
Springer
13 years 11 months ago
iCamp - The Educational Web for Higher Education
iCamp is an EC-funded research project in the area of Technology Enhanced Learning (TEL) that aims to support collaboration and social networking across systems, countries and disc...
Barbara Kieslinger, Fridolin Wild, Onur Ihsan Arsu...
QSHINE
2005
IEEE
14 years 1 months ago
Achieving Weighted Fairness between Uplink and Downlink in IEEE 802.11 DCF-Based WLANs
In this paper, we first propose an analytical model of WLANs (Wireless LANs) with an arbitrary backoff distribution and AIFS (Arbitration Inter-Frame Space). From the analysis, we ...
Jiwoong Jeong, Sunghyun Choi, Chong-kwon Kim