Sciweavers

3089 search results - page 442 / 618
» services 2008
Sort
View
NETWORKING
2008
15 years 5 months ago
Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks
Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
SEC
2008
15 years 5 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
SEDE
2008
15 years 5 months ago
Energy-Efficient Processing of Spatial Alarms on Mobile Clients
In this paper we present an energy efficient framework for processing spatial alarms on mobile clients, while maintaining low computation and storage costs. Our approach to spatia...
Ling Liu
SIGSAND
2008
15 years 5 months ago
Boundary Objects for Value-based Requirements Engineering
: Value-based requirements engineering focuses on the alignment of requirements engineering decisions and business value decisions. There is much evidence on the importance of this...
Barbara Paech, Aybüke Aurum
SIMUTOOLS
2008
15 years 5 months ago
Bridging UMTS and multicast routing in ns-2
In this paper, we present the design and the implementation of a novel scheme for the multicast transmission of data over Universal Mobile Telecommunications System (UMTS) network...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...