Sciweavers

988 search results - page 178 / 198
» Cryptographic access control in a distributed file system
Sort
View
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 7 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
IMC
2010
ACM
14 years 9 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
ECOOP
1993
Springer
15 years 3 months ago
A Language Framework for Multi-Object Coordination
Abstract. We have developed language support for the expression of multiobject coordination. In our language, coordination patterns can be speci ed abstractly, independent of the p...
Svend Frølund, Gul Agha
ECRTS
2007
IEEE
15 years 6 months ago
On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks
Since wireless ad-hoc networks use shared communication medium, accesses to the medium must be coordinated to avoid packet collisions. Transmission scheduling algorithms allocate ...
Shashi Prabh, Tarek F. Abdelzaher
102
Voted
LCN
2006
IEEE
15 years 5 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy