Sciweavers

5252 search results - page 969 / 1051
» Logic in Access Control
Sort
View
157
Voted
TMC
2008
112views more  TMC 2008»
15 years 3 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
JCP
2007
154views more  JCP 2007»
15 years 3 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
TSC
2008
112views more  TSC 2008»
15 years 3 months ago
A Privacy Preserving Repository for Data Integration across Data Sharing Services
Current data sharing and integration among various organizations require a central and trusted authority to collect data from all data sources and then integrate the collected data...
Stephen S. Yau, Yin Yin
TWC
2008
154views more  TWC 2008»
15 years 3 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...
134
Voted
CN
2004
104views more  CN 2004»
15 years 3 months ago
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access c...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....