Sciweavers

231 search results - page 36 / 47
» Working set-based access control for network file systems
Sort
View
JSAC
2006
130views more  JSAC 2006»
13 years 8 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
MOBICOM
2004
ACM
14 years 2 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
CONEXT
2009
ACM
13 years 6 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
PEWASUN
2005
ACM
14 years 2 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
SIGGRAPH
1993
ACM
14 years 22 days ago
Pad: an alternative approach to the computer interface
We believe that navigation in information spaces is best supported by tapping into our natural spatial and geographic ways of thinking. To this end, we are developing a new comput...
Ken Perlin, David Fox