Sciweavers

519 search results - page 65 / 104
» Enterprise computing asset management: a case study
Sort
View
WICSA
2004
15 years 14 days ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
INFOCOM
2007
IEEE
15 years 5 months ago
Discrete Power Control: Cooperative and Non-Cooperative Optimization
— We consider an uplink power control problem where each mobile wishes to maximize its throughput (which depends on the transmission powers of all mobiles) but has a constraint o...
Eitan Altman, Konstantin Avrachenkov, Gregory Mill...
LISA
2008
15 years 1 months ago
Rapid Parallel Systems Deployment: Techniques for Overnight Clustering
Automated system deployment frameworks and configuration management systems have been in wide use for a number of years. However, due to increasing pressures to maintain high avai...
Donna Cumberland, Randy Herban, Rick Irvine, Micha...
DKE
2008
135views more  DKE 2008»
14 years 11 months ago
Analyzing interacting WS-BPEL processes using flexible model generation
We address the problem of analyzing the interaction between WS-BPEL processes. We present a technology chain that starts out with a WS-BPEL process and translates it into a Petri ...
Niels Lohmann, Peter Massuthe, Christian Stahl, Da...
RAID
2005
Springer
15 years 4 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh