Sciweavers

518 search results - page 67 / 104
» On Automating Networked Enterprise Management
Sort
View
ETT
2000
149views Education» more  ETT 2000»
14 years 11 months ago
Channel Allocation with Recovery Strategy in Wireless Networks
With the increasing penetration of wireless communications systems, customers are expecting the same level of service, reliability and performance from the wireless communication s...
Yue Ma, James J. Han, Kishor S. Trivedi
CCGRID
2005
IEEE
15 years 4 months ago
A distributed resource and network partitioning architecture for service grids
Abstract In this paper, we propose the use of a distributed service management architecture for state-of-the-art service-enabled Grids. The architecture is capable of performing au...
Bruno Volckaert, Pieter Thysebaert, Marc De Leenhe...
JUCS
2010
183views more  JUCS 2010»
14 years 9 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
WISEC
2009
ACM
15 years 5 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
NSPW
2006
ACM
15 years 5 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald