Sciweavers

5252 search results - page 909 / 1051
» Logic in Access Control
Sort
View
CORR
2007
Springer
120views Education» more  CORR 2007»
15 years 4 months ago
Distributed Fair Scheduling Using Variable Transmission Lengths in Carrier-Sensing-based Wireless Networks
— The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC co...
Libin Jiang, Jean C. Walrand
JIIS
2008
104views more  JIIS 2008»
15 years 4 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun
JSW
2008
106views more  JSW 2008»
15 years 4 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
JNW
2006
120views more  JNW 2006»
15 years 4 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
JSAC
2006
170views more  JSAC 2006»
15 years 4 months ago
Cross-Layer design in HSDPA system to reduce the TCP effect
This paper focuses on the interaction between the Transport Control Protocol (TCP) layer and the radio interface in the High Speed Downlink Packet Access (HSDPA) wireless system. I...
Mohamad Assaad, Djamal Zeghlache