Sciweavers

370 search results - page 52 / 74
» An Approach to Ad hoc Cloud Computing
Sort
View
ADHOCNOW
2008
Springer
14 years 11 months ago
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks
This paper presents a work in progress which deals with the problem of node misbehaviour in ad-hoc networks. A realistic approach is used to determine the impact of contention wind...
Szymon Szott, Marek Natkaniec, Andrzej R. Pach
ACSAC
2002
IEEE
15 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
PERCOM
2009
ACM
15 years 10 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
OTM
2005
Springer
15 years 3 months ago
Translating XML Web Data into Ontologies
Abstract. Translating XML data into ontologies is the problem of finding an instance of an ontology, given an XML document and a specification of the relationship between the XML...
Yuan An, John Mylopoulos
DPD
2006
144views more  DPD 2006»
14 years 9 months ago
Integration of transient Web services into a virtual peer to peer Web service registry
Transient Web service provisioning implies a variety of different requirements that are hard to meet in traditional Web service environments. Currently, Web service brokerage focus...
Schahram Dustdar, Martin Treiber