Sciweavers

1404 search results - page 278 / 281
» Supporting Dynamic Changes in Web Service Environments
Sort
View
SECPERU
2006
IEEE
14 years 1 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
GRID
2005
Springer
14 years 1 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
WSC
2000
13 years 8 months ago
Use of discrete event simulation to validate an agent based scheduling engine
This paper discusses the use of simulation in a new context. Most often QUEST is viewed as a stand-alone simulation tool to analyze and understand shop floor behavior. It has rare...
Shubhabrata Biswas, Sara Merchawi
JNCA
2007
106views more  JNCA 2007»
13 years 7 months ago
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system
Bluetooth is a new technology for low-cost, low-power, and short-range wireless communication. By constructing a piconet, Bluetooth device establishes link and communicates with o...
Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih...
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
13 years 11 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert