Sciweavers

2801 search results - page 100 / 561
» On the Adequateness of the Connection Method
Sort
View
CN
1999
77views more  CN 1999»
15 years 4 months ago
Web Content Adaptation to Improve Server Overload Behavior
This paper presents a study of web content adaptation to improve server overload performance, as well as an implementation of a web content adaptation software prototype. When the...
Tarek F. Abdelzaher, Nina T. Bhatti
CSE
2009
IEEE
15 years 11 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
IWCMC
2009
ACM
15 years 11 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
ICDCS
2008
IEEE
15 years 11 months ago
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems
Large-scale distributed systems provide an attractive scalable infrastructure for network applications. However, the loosely-coupled nature of this environment can make data acces...
Jinoh Kim, Abhishek Chandra, Jon B. Weissman
IPPS
2008
IEEE
15 years 11 months ago
Middleware support for delay-tolerant service provision in disconnected mobile ad hoc networks
The service-oriented approach is known to be adequate for building distributed applications for mobile ad hoc networks, and a number of successful research works using this approa...
Yves Mahéo, Romeo Said, Frédé...