Sciweavers

832 search results - page 167 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 6 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
INFOCOM
2000
IEEE
13 years 9 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...