Sciweavers

3276 search results - page 540 / 656
» Data Management for Pervasive Computing
Sort
View
81
Voted
NOSSDAV
2005
Springer
15 years 4 months ago
A traffic model for the Xbox game Halo 2
This paper analyses the traffic characteristics of, and proposes a traffic model for, the Xbox game Halo 2. Our goal is to help players and network providers to estimate the amoun...
Sebastian Zander, Grenville J. Armitage
WS
2004
ACM
15 years 4 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
ICDCS
2003
IEEE
15 years 4 months ago
Experiences With Monitoring OSPF on a Regional Service Provider Network
This paper presents the results from a detailed, experimental study of OSPF, an intra-domain routing protocol, running on a mid-size regional Internet service provider. Using mult...
David Watson, Farnam Jahanian, Craig Labovitz
ICPPW
2003
IEEE
15 years 4 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
89
Voted
ISIPTA
2003
IEEE
111views Mathematics» more  ISIPTA 2003»
15 years 4 months ago
The DecideIT Decision Tool
The nature of much information available to decision makers is vague and imprecise, be it information for human managers in organisations or for process agents in a distributed co...
Mats Danielson, Love Ekenberg, Jim Johansson, Aron...