Sciweavers

307 search results - page 31 / 62
» Subjective-Cost Policy Routing
Sort
View
COLCOM
2007
IEEE
14 years 2 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
INFOCOM
2007
IEEE
14 years 2 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
POLICY
2005
Springer
14 years 1 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
DSN
2008
IEEE
14 years 2 months ago
Improving dependability of network configuration through policy classification
As a network evolves over time, multiple operators modify its configuration, without fully considering what has previously been done. Similar policies are defined more than once, ...
Sihyung Lee, Tina Wong, Hyong S. Kim
INFOCOM
2005
IEEE
14 years 1 months ago
Asymptotically optimal transmission policies for low-power wireless sensor networks
— We consider wireless sensor networks with multiple gateways and multiple classes of traffic carrying data generated by different sensory inputs. The objective is to devise joi...
Ioannis Ch. Paschalidis, Wei Lai, David Starobinsk...