Sciweavers

7992 search results - page 1461 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
JCST
2008
159views more  JCST 2008»
15 years 4 months ago
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications
To minimize the execution time of a sensing task over a multi-hop hierarchical sensor network, we present a coordinated scheduling method following the divisible load scheduling p...
Xiao-Lin Li, Jiannong Cao
JSAC
2006
153views more  JSAC 2006»
15 years 4 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...
JUCS
2006
166views more  JUCS 2006»
15 years 4 months ago
CAMMD: Context-Aware Mobile Medical Devices
: Telemedicine applications on a medical practitioner's mobile device should be context-aware. This can vastly improve the effectiveness of mobile applications and is a step t...
Timothy O'Sullivan, John O'Donoghue, John Herbert,...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 4 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
« Prev « First page 1461 / 1599 Last » Next »