Sciweavers

2392 search results - page 107 / 479
» Channel-Hopping Multiple Access
Sort
View
GI
2009
Springer
14 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
INFOCOM
2009
IEEE
15 years 4 months ago
Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional Links
—We investigate an architecture for multi-Gigabit outdoor mesh networks operating in the unlicensed 60 GHz “millimeter (mm) wave” band. In this band, the use of narrow beams ...
Raghuraman Mudumbai, Sumit Singh, Upamanyu Madhow
IMC
2004
ACM
15 years 3 months ago
Bandwidth estimation in broadband access networks
There has been much work on developing techniques for estimating the capacity and the available bandwidth of network paths based on end-point measurements. The focus has primarily...
Karthik Lakshminarayanan, Venkata N. Padmanabhan, ...
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 3 months ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig
ICDCS
2000
IEEE
15 years 2 months ago
Static and Adaptive Data Replication Algorithms for Fast Information Access in Large Distributed Systems
Creating replicas of frequently accessed objects across a read-intensive network can result in large bandwidth savings which, in turn, can lead to reduction in user response time....
Thanasis Loukopoulos, Ishfaq Ahmad