Sciweavers

18697 search results - page 3714 / 3740
» Systemic Security Management
Sort
View
IQ
2007
15 years 5 months ago
In Search Of An Accuracy Metric
Practitioners and researchers often refer to error rates or accuracy percentages of databases. The former is the number of cells in error divided by the total number of cells; the...
Craig W. Fisher, Eitel J. M. Lauría, Caroly...
ICWN
2004
15 years 5 months ago
Fast and Efficient IP Handover in IEEE 802.11 Wireless LANs
: This paper presents an effective and simple solution to the problem of Layer 3 (L3) handover in IEEE 802.11 wireless LANs (WLANs), so as to extend the IP mobility area of 802.11 ...
Ioanna Samprakou, Christos Bouras, Theodore Karoub...
138
Voted
ICHIM
2001
123views more  ICHIM 2001»
15 years 5 months ago
Digital Video and Hypermedia Based New Services for Working on Patrimonial Archives
The "Institut National de I'Audiovisuel" (1NA) is in charge of keeping records of national TV broadcasts. Its main function is to provide TV producers with authenti...
Marc Nanard, Jocelyne Nanard, David Genest, Michel...
141
Voted
ICWN
2003
15 years 5 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
WICSA
2001
15 years 5 months ago
A Highly-Extensible, XML-Based Architecture Description Language
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Eric M. Dashofy, André van der Hoek, Richar...
« Prev « First page 3714 / 3740 Last » Next »