Sciweavers

126 search results - page 3 / 26
» Centrality in Policy Network Drawings
Sort
View
SIGCOMM
2009
ACM
14 years 9 days ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
INFOCOM
2005
IEEE
13 years 11 months ago
Asymptotically optimal transmission policies for low-power wireless sensor networks
— We consider wireless sensor networks with multiple gateways and multiple classes of traffic carrying data generated by different sensory inputs. The objective is to devise joi...
Ioannis Ch. Paschalidis, Wei Lai, David Starobinsk...
POLICY
2005
Springer
13 years 11 months ago
Approximating Service Utility from Policies and Value Function Patterns
Service-oriented computing provides the right means for building flexible systems that allow dynamic configuration and on-the-fly composition. In order to realize this vision, ...
Steffen Lamparter, Daniel Oberle, Andreas Eberhart
ICMCS
1997
IEEE
142views Multimedia» more  ICMCS 1997»
13 years 10 months ago
A Rate Allocation Policy with MCR/PCR Support and Distributed ABR Implementation Using Explicit Rate Feedback
An important concept in the available bit rate (ABR) service model as defined by the ATM Forum is the minimum cell rate (MCR) guarantee as well as the peak cell rate (PCR) constra...
Yiwei Thomas Hou, Henry H.-Y. Tzeng, Shivendra S. ...
EGOV
2003
Springer
13 years 11 months ago
South African e-Government Policy and Practices: A Framework to Close the Gap
E-government in South Africa has a particularly important historical and social context due to the legacy of apartheid. As a result, a ten year egovernment implementation horizon h...
Jonathan Trusler