Sciweavers

2392 search results - page 210 / 479
» Channel-Hopping Multiple Access
Sort
View
CCS
2007
ACM
15 years 8 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
IWCMC
2006
ACM
15 years 8 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
DAWAK
1999
Springer
15 years 6 months ago
Dynamic Data Warehouse Design
A data warehouse DW can be seen as a set of materialized views de ned over remote base relations. When a query is posed, it is evaluated locally, using the materialized views, wi...
Dimitri Theodoratos, Timos K. Sellis
ISCC
1999
IEEE
127views Communications» more  ISCC 1999»
15 years 6 months ago
A Modular Location-Aware Service and Application Platform
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
Tom Pfeifer, Radu Popescu-Zeletin
EDCC
1999
Springer
15 years 6 months ago
A Fault Tolerant Clock Synchronization Algorithm for Systems with Low-Precision Oscillators
In this paper we present a new fault tolerant clock synchronization algorithm called the Fault Tolerant Daisy Chain algorithm. It is intended for internal clock synchronization of...
Henrik Lönn