Sciweavers

2335 search results - page 430 / 467
» Wireless network cloud: Architecture and system requirements
Sort
View
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
HPDC
2005
IEEE
14 years 1 months ago
Design and implementation tradeoffs for wide-area resource discovery
This paper describes the design and implementation of SWORD, a scalable resource discovery service for widearea distributed systems. In contrast to previous systems, SWORD allows ...
David L. Oppenheimer, Jeannie R. Albrecht, David A...
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
ICSOC
2004
Springer
14 years 1 months ago
Hot service deployment in an ad hoc grid environment
In this paper, we present a solution to the problem of dynamically deploying grid service factories onto computing nodes running an implementation of the Open Grid Services Infras...
Thomas Friese, Matthew Smith, Bernd Freisleben