Sciweavers

1368 search results - page 63 / 274
» Modeling the Telephone Call Network
Sort
View
125
Voted
PERCOM
2006
ACM
16 years 10 days ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
118
Voted
ISNN
2007
Springer
15 years 7 months ago
Integrated Analytic Framework for Neural Network Construction
Abstract. This paper investigates the construction of a wide class of singlehidden layer neural networks (SLNNs) with or without tunable parameters in the hidden nodes. It is a cha...
Kang Li, Jian Xun Peng, Minrui Fei, Xiaoou Li, Wen...
112
Voted
LCN
2003
IEEE
15 years 6 months ago
Evaluating System Performance in Gigabit Networks
- With the current wide deployment of Gigabit Ethernet technology in the backbone and workgroup switches, the network performance bottleneck has shifted for the first time in nearl...
Khaled Salah, K. El-Badawi
107
Voted
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 7 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 12 days ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne