Sciweavers

7741 search results - page 1408 / 1549
» Security in Active Networks
Sort
View
SECON
2007
IEEE
15 years 11 months ago
The Optimum Number of OSPF Areas for MANETs
—Mobile ad hoc networks (MANETs) are a critical technology in filling the gap where the network infrastructure is insufficient or does not exist at all. The dynamic topology of...
Jangeun Jun, Mihail L. Sichitiu, Hector D. Flores,...
141
Voted
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
15 years 10 months ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
142
Voted
BROADNETS
2005
IEEE
15 years 10 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi
SIGCOMM
2004
ACM
15 years 10 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
EGOV
2004
Springer
15 years 10 months ago
e-Government and Information Society: The First Regional Law in Italy
The law recently approved by the the Regional Administration of Tuscany (January 2004) regulates the promotion of electronic administration and the development of the Information ...
Isabella D'Elia
« Prev « First page 1408 / 1549 Last » Next »