Sciweavers

3031 search results - page 153 / 607
» Reuse in the application layer
Sort
View
NOMS
1998
IEEE
154views Communications» more  NOMS 1998»
15 years 8 months ago
A framework for end-to-end proactive network management
Current advances in networking, computing, software and web technologies have led to an explosive growth in the development of networked applications. Management of large-scale ne...
Salim Hariri, Yoonhee Kim, K. Varshney, R. Kaminsk...
FUZZY
1999
Springer
196views Fuzzy Logic» more  FUZZY 1999»
15 years 8 months ago
A Human Centered Architecture for Distributed Retrieval of Medical Images
In this paper we describe a distributed retrieval system for medical images based on a Human Centered Virtual Machine (HCVM). HCVM layered architecture allows indexing and retrieva...
R. Castelletti, Ernesto Damiani, Giovanni Righini,...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 10 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
AINA
2006
IEEE
15 years 10 months ago
Adaptive Timeout Policies for Wireless Links
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
George Xylomenos, Christos Tsilopoulos
CNSR
2005
IEEE
15 years 9 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu