Sciweavers

871 search results - page 93 / 175
» A Decentralized Authorization Architecture
Sort
View
HPDC
2010
IEEE
14 years 11 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
CORR
2008
Springer
175views Education» more  CORR 2008»
14 years 10 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...
IJIPT
2008
191views more  IJIPT 2008»
14 years 10 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
JSW
2006
124views more  JSW 2006»
14 years 9 months ago
Dynamic Web Service Calls for Data Integration
Web Services are considered as a dominant paradigm for constructing and composing distributed business application and enabling enterprise-wide interoperability. A peer to peer arc...
Salima Benbernou, Mohand-Said Hacid
FTNET
2007
107views more  FTNET 2007»
14 years 9 months ago
Network Optimization and Control
We study how protocol design for various functionalities within a communication network architecture can be viewed as a distributed resource allocation problem. This involves unde...
Srinivas Shakkottai, R. Srikant