Sciweavers

115 search results - page 20 / 23
» Hidden access control policies with hidden credentials
Sort
View
MOBISYS
2005
ACM
14 years 7 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica
CJ
2002
122views more  CJ 2002»
13 years 7 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
CASCON
2006
131views Education» more  CASCON 2006»
13 years 8 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
ICDCSW
2005
IEEE
14 years 1 months ago
An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks
Recently, several directional MAC protocols using smart antennas or directional antennas have been proposed for wireless ad hoc networks including our proposed MAC protocol called...
Masanori Takata, Masaki Bandai, Takashi Watanabe
VTC
2008
IEEE
135views Communications» more  VTC 2008»
14 years 1 months ago
MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors
Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua