Sciweavers

2120 search results - page 34 / 424
» Management and Sharing of Bibliographies
Sort
View
AINA
2004
IEEE
14 years 1 months ago
RED with Optimized Dynamic Threshold Deployment on Shared Buffer
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, ...
Chengchen Hu, Bin Liu
SEMWEB
2005
Springer
14 years 3 months ago
Oyster - Sharing and Re-using Ontologies in a Peer-to-Peer Community
In this poster, we present Oyster, a Peer-to-Peer system for exchanging ontology metadata among communities in the Semantic Web. Oyster exploits semantic web techniques in data re...
Raúl Palma, Peter Haase
AINA
2004
IEEE
14 years 1 months ago
Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng...
VLDB
1991
ACM
143views Database» more  VLDB 1991»
14 years 1 months ago
Adaptive Locking Strategies in a Multi-node Data Sharing Environment
This paper describes some of the concurrency control 1” lgorithms used in RdMVMS RdbIVMS uses the ,fac.ilities provided by the VMS lock manager in order to perform locking among...
Ashok M. Joshi
MOBICOM
2010
ACM
13 years 10 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...