Sciweavers

1994 search results - page 272 / 399
» Limited Software Warranties
Sort
View
SECON
2008
IEEE
14 years 3 months ago
Content Distribution in VANETs Using Network Coding: The Effect of Disk I/O and Processing O/H
Abstract—Besides safe navigation (e.g., warning of approaching vehicles), car to car communications will enable a host of new applications, ranging from office-on-the-wheel supp...
Seung-Hoon Lee, Uichin Lee, Kang-Won Lee, Mario Ge...
ADBIS
2008
Springer
128views Database» more  ADBIS 2008»
14 years 3 months ago
Pylonix: A Database Module for Collaborative Document Management
Abstract. In today’s world, document management plays an increasingly important role. However, there is currently no solution to manage complex documents in an integrated manner....
Christian Tilgner, Dietrich Christopeit, Klaus R. ...
COMSWARE
2007
IEEE
14 years 3 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
COMSWARE
2007
IEEE
14 years 3 months ago
Disruption-Tolerant Link-level Mechanisms for Extreme Wireless Network Environments
— Wireless links pose significant challenges in terms of achievable goodput and residual loss-rate. Our recent enhancements, called LT-TCP make TCP loss-tolerant in heavy/bursty...
Vijaynarayanan Subramanian, K. K. Ramakrishnan, Sh...
DSN
2007
IEEE
14 years 3 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu