Sciweavers

7545 search results - page 1473 / 1509
» Coupling Application Design and User Interface Design
Sort
View
WISEC
2009
ACM
15 years 8 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
SEMWEB
2009
Springer
15 years 8 months ago
What Four Million Mappings Can Tell You about Two Hundred Ontologies
The field of biomedicine has embraced the Semantic Web probably more than any other field. As a result, there is a large number of biomedical ontologies covering overlapping area...
Amir Ghazvinian, Natalya Fridman Noy, Clement Jonq...
RECSYS
2009
ACM
15 years 8 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
TELETRAFFIC
2007
Springer
15 years 7 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
ICAC
2006
IEEE
15 years 7 months ago
QMON: QoS- and Utility-Aware Monitoring in Enterprise Systems
Abstract— The scale, reliability, and cost requirements of enterprise data centers require automation of center management. Examples include provisioning, scheduling, capacity pl...
Sandip Agarwala, Yuan Chen, Dejan S. Milojicic, Ka...
« Prev « First page 1473 / 1509 Last » Next »