Sciweavers

1012 search results - page 197 / 203
» Nomadic Service Points
Sort
View
COMCOM
2008
111views more  COMCOM 2008»
13 years 7 months ago
An admission control algorithm for multi-hop 802.11e-based WLANs
Recently, wireless local area network (WLAN) hotspots have been deployed in many areas (e.g., cafes, airports, university campuses). The new IEEE 802.11e standard further provides...
Yuxia Lin, Vincent W. S. Wong
DA
2010
141views more  DA 2010»
13 years 7 months ago
Optimal Static Hedging of Volumetric Risk in a Competitive Wholesale Electricity Market
In competitive wholesale electricity markets, regulated load serving entities (LSEs) and marketers with default service contracts have obligations to serve fluctuating load at pre...
Yumi Oum, Shmuel S. Oren
AO
2006
127views more  AO 2006»
13 years 7 months ago
Formal ontology meets industry
in ontology is quite abstract and often based on toy-examples to the point that the gap between the work of theoreticians and the needs of real applications is too wide to be cross...
Stefano Borgo, Matteo Cristani, Roberta Cuel
CCR
2007
110views more  CCR 2007»
13 years 7 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
IEEESP
2006
108views more  IEEESP 2006»
13 years 7 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven