Sciweavers

1818 search results - page 208 / 364
» How users use access control
Sort
View
144
Voted
LCN
2005
IEEE
15 years 10 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
SIGCOMM
2009
ACM
15 years 11 months ago
Enhancing dynamic cloud-based services using network virtualization
It is envisaged that services and applications will migrate to a cloud-computing paradigm where thin-clients on userdevices access, over the network, applications hosted in data c...
Fang Hao, T. V. Lakshman, Sarit Mukherjee, Haoyu S...
ICRA
2000
IEEE
90views Robotics» more  ICRA 2000»
15 years 9 months ago
Effective Vehicle Teleoperation on the World Wide Web
Our goal is to make vehicle teleoperation accessible to all users. To do this, we are developing easy-to-use yet capable Web tools which enable efficient, robust teleoperation in...
Sébastien Grange, Terrence Fong, Charles Ba...
DSN
2004
IEEE
15 years 8 months ago
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems
Software configuration problems are a major source of failures in computer systems. In this paper, we present a new framework for categorizing configuration problems. We apply thi...
Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong We...
ICECCS
2007
IEEE
115views Hardware» more  ICECCS 2007»
15 years 9 months ago
On-the-fly model checking for C programs with extended CADP in FMICS-jETI
A current trend in the software engineering community is to integrate different tools in a friendly and powerful development environment for use by final users. This is also the c...
María-del-Mar Gallardo, Pedro Merino, Chris...