Sciweavers

472 search results - page 46 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
GI
2004
Springer
14 years 1 months ago
Providing Service Continuity in Ad Hoc Networks
: Most of the investigations on ad hoc protocols do not consider the fact that future wireless networks are capable to adapt their behaviour to the channel situation. These adaptin...
Erik Weiss, Bangnan Xu, Sven Hischke
MOBIDE
1999
ACM
14 years 16 hour ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham
ICDCSW
2005
IEEE
14 years 1 months ago
Using a Fairness Monitoring Service to Improve Load-Balancing in DSR
Many routing protocols for MANETs do not promote a balanced use of resources among the participating nodes, since they are designed to optimize other criteria, such as the number ...
Hugo Miranda, Luís Rodrigues
CCS
2004
ACM
14 years 1 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
HPDC
2005
IEEE
14 years 1 months ago
Recording and using provenance in a protein compressibility experiment
Very large scale computations are now becoming routinely used as a methodology to undertake scientific research. In this context, ‘provenance systems’ are regarded as the equ...
Paul T. Groth, Simon Miles, Weijian Fang, Sylvia C...