Sciweavers

2200 search results - page 145 / 440
» Hop Integrity in Computer Networks
Sort
View
ICPP
1999
IEEE
15 years 6 months ago
New Delay Analysis in High Speed Networks
The implementation of bounded-delay services over integrated services networks relies admission control mechanisms that in turn use end-to-end delay computation algorithms. For gu...
Chengzhi Li, Riccardo Bettati, Wei Zhao
97
Voted
PERCOM
2008
ACM
16 years 2 months ago
A Lightweight Sensor Network Management System Design
Abstract--In this paper, we propose a lightweight and transparent management framework for TinyOS sensor networks, called L-SNMS, which minimizes the overhead of management functio...
Fenghua Yuan, Wen-Zhan Song, Nina Peterson, Yang P...
SACMAT
2011
ACM
14 years 5 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
145
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
176
Voted
ISSADS
2005
Springer
15 years 8 months ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao