Sciweavers

6110 search results - page 1153 / 1222
» Graceful Network Operations
Sort
View
COMSWARE
2006
IEEE
14 years 16 days ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
FOCS
2004
IEEE
14 years 16 days ago
Triangulation and Embedding Using Small Sets of Beacons
Concurrent with recent theoretical interest in the problem of metric embedding, a growing body of research in the networking community has studied the distance matrix defined by n...
Jon M. Kleinberg, Aleksandrs Slivkins, Tom Wexler
BTW
2009
Springer
132views Database» more  BTW 2009»
14 years 3 days ago
End-to-End Performance Monitoring of Databases in Distributed Environments
: This demonstration features the IBM DB2 Performance Expert for Linux, Unix and Windows, a high-end database monitoring tool that is capable of end-to-end monitoring in distribute...
Stefanie Scherzinger, H. Karn, T. Steinbach
MOBISYS
2010
ACM
13 years 11 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
MOBISYS
2008
ACM
13 years 11 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
« Prev « First page 1153 / 1222 Last » Next »