Sciweavers

201 search results - page 14 / 41
» Supporting ad hoc Analyses on Enterprise Models
Sort
View
TMC
2008
134views more  TMC 2008»
13 years 7 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
SIMUTOOLS
2008
13 years 9 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
WIMOB
2008
IEEE
14 years 2 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ICSOC
2009
Springer
13 years 5 months ago
A Reassessment of Enterprise Architecture Implementation
Abstract. Aside of day-to-day business in some organizations Enterprise Architecture (EA) seems to be successful while it is not in others that also have notations, models, methods...
Stephan Aier, Joachim Schelp
VLDB
1991
ACM
196views Database» more  VLDB 1991»
13 years 11 months ago
Kaleidoscope Data Model for An English-like Query Language
Most database interfaces provide poor guidance on ad hoc query formulation, burdening users to learn, and to recall precisely the query language and the database. Kaleidoscope avo...
Sang Kyun Cha, Gio Wiederhold