Sciweavers

909 search results - page 163 / 182
» Autonomic control and personalization of a wireless access n...
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
MHCI
2004
Springer
15 years 3 months ago
Web Page Transformation When Switching Devices
With network and small screen device improvements, such as wireless abilities, increased memory and CPU speeds, users are no longer limited by location when accessing on-line infor...
Bonnie MacKay, Carolyn R. Watters, Jack Duffy
PDP
2003
IEEE
15 years 2 months ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
MOBICOM
1999
ACM
15 years 2 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
SENSYS
2003
ACM
15 years 2 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...