Sciweavers

1123 search results - page 171 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
VTC
2007
IEEE
15 years 10 months ago
Power Fairness in a Scalable Ring-Based Wireless Mesh Network
—The wireless mesh network (WMN) is an essential low-power solution to support ubiquitous broadband services. However, mesh networks face the power unfairness and throughput bott...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
SIS
2008
15 years 5 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
JCP
2008
142views more  JCP 2008»
15 years 4 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun
OTM
2005
Springer
15 years 9 months ago
Accessing X Applications over the World-Wide Web
Abstract. The X Protocol, an asynchronous network protocol, was developed at MIT amid the need to provide a network transparent graphical user interface primarily for the UNIX Oper...
Arno Puder, Siddharth Desai
INFOCOM
2010
IEEE
15 years 2 months ago
On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks
—While there has been much progress in designing backpressure based stabilizing algorithms for multihop wireless networks, end-to-end performance (e.g., end-to-end buffer usage) ...
V. J. Venkataramanan, Xiaojun Lin, Lei Ying, Sanja...