Sciweavers

937 search results - page 168 / 188
» IT Service Processes - State and Open Issues
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
15 years 2 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
IJWMC
2010
103views more  IJWMC 2010»
15 years 1 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
EJWCN
2011
197views more  EJWCN 2011»
14 years 11 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
TDSC
2010
157views more  TDSC 2010»
14 years 11 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
EGOV
2011
Springer
14 years 4 months ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...