Sciweavers

2365 search results - page 396 / 473
» Data access in distributed simulations of multi-agent system...
Sort
View
SAC
2004
ACM
15 years 3 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
GLOBECOM
2009
IEEE
15 years 4 months ago
A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation
Abstract—Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput a...
Vijay Raman, Matthew C. Caesar
PDPTA
2004
14 years 11 months ago
On-demand Grid Storage Using Scavenging
Increasingly scientific discoveries are driven by analyses of massively distributed bulk data. This has led to the proliferation of high-end mass storage systems, storage area clu...
Sudharshan Vazhkudai
COMCOM
2008
91views more  COMCOM 2008»
14 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
VLDB
2005
ACM
132views Database» more  VLDB 2005»
15 years 10 months ago
Hash-based labeling techniques for storage scaling
Scalable storage architectures allow for the addition or removal of storage devices to increase storage capacity and bandwidth or retire older devices. Assuming random placement of...
Shu-Yuen Didi Yao, Cyrus Shahabi, Per-Åke Larson