Sciweavers

607 search results - page 99 / 122
» Content-Based Routing: Different Plans for Different Data
Sort
View
83
Voted
PE
2007
Springer
100views Optimization» more  PE 2007»
14 years 9 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
JASIS
2010
316views more  JASIS 2010»
14 years 8 months ago
Information sources and perceived success in corporate finance
: The work of corporate finance professionals is information intensive. In spite of that the practices and motivations of their information preferences have been researched very li...
Isto Huvila
CONEXT
2006
ACM
15 years 3 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
PERCOM
2008
ACM
15 years 9 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 4 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...