Sciweavers

1190 search results - page 183 / 238
» Enhancing Sharing for Precision
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
14 years 12 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 12 months ago
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations
A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance...
Mahalakshmi Chidambara Natarajan, Ramaswamy Muthia...
CE
2007
121views more  CE 2007»
14 years 12 months ago
Transition from traditional to ICT-enhanced learning environments in undergraduate chemistry courses
This paper describes a three-year study conducted among chemistry instructors (professors and teaching assistants) at a post-secondary institution. The goal was to explore the int...
Miri Barak
IS
2006
14 years 11 months ago
The MurMur project: Modeling and querying multi-representation spatio-temporal databases
Successful information management implies the ability to design accurate representations of the real world of interest, in spite of the diversity of perceptions from the applicati...
Christine Parent, Stefano Spaccapietra, Esteban Zi...
JNW
2006
120views more  JNW 2006»
14 years 11 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani