Sciweavers

3712 search results - page 582 / 743
» Role-Based Access Control
Sort
View
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 8 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
MSN
2005
Springer
165views Sensor Networks» more  MSN 2005»
15 years 8 months ago
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
In the area of wireless mobile communication, minimizing energy consumption as well as maximizing data throughput in medium access control (MAC) layer is a very important research ...
Changsu Suh, Young-Bae Ko, Jai-Hoon Kim
NIME
2005
Springer
138views Music» more  NIME 2005»
15 years 8 months ago
ESP: A Driving Interface for Expression Synthesis
In the Expression Synthesis Project (ESP), we propose a driving interface for expression synthesis. ESP aims to provide a compelling metaphor for expressive performance so as to m...
Elaine Chew, Alexandre R. J. François, Jie ...
PAM
2005
Springer
15 years 8 months ago
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
In this paper we present results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths...
Alok Shriram, Margaret Murray, Young Hyun, Nevil B...
SDMW
2005
Springer
15 years 8 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...