Sciweavers

3712 search results - page 625 / 743
» Role-Based Access Control
Sort
View
JCIT
2008
245views more  JCIT 2008»
13 years 9 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
JCM
2008
196views more  JCM 2008»
13 years 9 months ago
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks
Survivability is one of the critical issues and the most important research topics in the fields of wireless sensor networks (WSNs). Energy efficiency is one of the determining fac...
Yuebin Bai, Shujuan Liu, Mo Sha, Yang Lu, Cong Xu
CORR
2007
Springer
107views Education» more  CORR 2007»
13 years 9 months ago
Morphological annotation of Korean with Directly Maintainable Resources
This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to p...
Ivan Berlocher, Hyun-Gue Huh, Eric Laporte, Jee-Su...
CORR
2007
Springer
120views Education» more  CORR 2007»
13 years 9 months ago
Distributed Fair Scheduling Using Variable Transmission Lengths in Carrier-Sensing-based Wireless Networks
— The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC co...
Libin Jiang, Jean C. Walrand
JIIS
2008
104views more  JIIS 2008»
13 years 9 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun