Sciweavers

1010 search results - page 39 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
AINA
2007
IEEE
15 years 6 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
SUTC
2008
IEEE
15 years 6 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
15 years 9 months ago
Structure and Dynamics of Research Collaboration in Computer Science.
Complex systems exhibit emergent patterns of behavior at different levels of organization. Powerful network analysis methods, developed in physics and social sciences, have been s...
Andre Nash, Christian Bird, Earl T. Barr, Premkuma...
MOBISYS
2008
ACM
15 years 11 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
SC
2000
ACM
15 years 4 months ago
The Failure of TCP in High-Performance Computational Grids
Distributed computational grids depend on TCP to ensure reliable end-to-end communication between nodes across the wide-area network (WAN). Unfortunately, TCP performance can be a...
Wu-chun Feng, Peerapol Tinnakornsrisuphap