Sciweavers

4013 search results - page 652 / 803
» Supporting Database Applications as a Service
Sort
View
SAC
2010
ACM
15 years 11 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
WIMOB
2008
IEEE
15 years 11 months ago
A Distributed Scheduling Algorithm with QoS Provisions in Multi-hop Wireless Mesh Networks
—Multi-hop wireless mesh networks (WMNs) are considered a promising technology to backhaul heterogeneous data traffic from wireless access networks to the wired Internet. WMNs a...
Chi Harold Liu, Athanasios Gkelias, Yun Hou, Kin K...
123
Voted
SECON
2007
IEEE
15 years 11 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
168
Voted
CONEXT
2006
ACM
15 years 10 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 10 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke