Sciweavers

1259 search results - page 20 / 252
» On Survivable Access Network Design: Complexity and Algorith...
Sort
View
SIGOPSE
1990
ACM
15 years 3 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...
TWC
2008
140views more  TWC 2008»
14 years 11 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
MOBICOM
2012
ACM
13 years 2 months ago
AutoMAC: rateless wireless concurrent medium access
Current wireless network design is built on the ethos of avoiding interference. In this paper we question this long-held design principle. We show that with appropriate design, su...
Aditya Gudipati, Stephanie Pereira, Sachin Katti
PERCOM
2005
ACM
15 years 11 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
IWCMC
2006
ACM
15 years 5 months ago
DSMA: an access method for MIMO ad hoc networks based on distributed scheduling
In this work, we analyze the effects of a distributed transmission coordination scheme that is particularly suited for ad hoc networks with the ability to exploit spatially–mult...
Paolo Casari, Marco Levorato, Michele Zorzi