Sciweavers

1517 search results - page 280 / 304
» Time and Location Based Services with Access Control
Sort
View
INFOSCALE
2009
ACM
14 years 3 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
JAIR
2007
87views more  JAIR 2007»
13 years 8 months ago
Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets
In the recent years several research efforts have focused on the concept of time granularity and its applications. A first stream of research investigated the mathematical model...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
GRID
2007
Springer
14 years 2 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
PIMRC
2010
IEEE
13 years 6 months ago
Automatically configured, optimised and QoS aware wireless mesh networks
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal i...
Elias Z. Tragos, Raffaele Bruno, Emilio Ancillotti...
CN
2004
104views more  CN 2004»
13 years 8 months ago
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access c...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....