Sciweavers

5413 search results - page 882 / 1083
» Data Grid Management Systems
Sort
View
123
Voted
POLICY
2009
Springer
15 years 10 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
120
Voted
CISS
2008
IEEE
15 years 10 months ago
End-to-end bandwidth and available bandwidth estimation in multi-hop IEEE 802.11b ad hoc networks
—In this paper we estimate the end-to-end total bandwidth (BW) and available bandwidth (ABW) of a path between a pair of nodes in an IEEE 802.11b ad hoc network, both as function...
Marco A. Alzate, Jose-Carlos Pagan, Néstor ...
148
Voted
CISS
2008
IEEE
15 years 10 months ago
Improved sum-rate optimization in the multiuser MIMO downlink
—We consider linear precoding and decoding in the downlink of a multiuser multiple-input, multiple-output (MIMO) system. In this scenario, the transmitter and the receivers may e...
Adam J. Tenenbaum, Raviraj S. Adve
122
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
130
Voted
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl