Sciweavers

7865 search results - page 1447 / 1573
» Peer-to-Peer Data Management
Sort
View
JNSM
2010
110views more  JNSM 2010»
14 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
SAC
2010
ACM
14 years 4 months ago
Convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature
Map labeling of point-feature is the problem of placing text labels to corresponding point features on a map in a way that minimizes overlaps while satisfying basic rules for the ...
Wan D. Bae, Shayma Alkobaisi, Petr Vojtechovsk&yac...
SIGMETRICS
2010
ACM
129views Hardware» more  SIGMETRICS 2010»
14 years 4 months ago
From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP
Traffic matrices play a pivotal role in the management of an ISP's network such as various levels of traffic engineering and capacity planning. However, it is unclear how the...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
TMC
2010
137views more  TMC 2010»
14 years 4 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
TMI
2010
123views more  TMI 2010»
14 years 4 months ago
Optimal Experimental Design for Diffusion Kurtosis Imaging
Diffusion Kurtosis Imaging (DKI) is a new magnetic resonance imaging model that describes the non-Gaussian diffusion behavior in tissues. It has recently been shown that DKI param...
Dirk H. J. Poot, Arnold Jan den Dekker, Eric Achte...
« Prev « First page 1447 / 1573 Last » Next »