Sciweavers

6975 search results - page 1340 / 1395
» Personal Information Agent
Sort
View
SACMAT
2003
ACM
15 years 5 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
SENSYS
2003
ACM
15 years 5 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
SENSYS
2003
ACM
15 years 5 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
SIGMETRICS
2003
ACM
15 years 5 months ago
Queueing systems with long-range dependent input process and subexponential service times
We analyze the asymptotic tail distribution of stationary waiting times and stationary virtual waiting times in a singleserver queue with long-range dependent arrival process and ...
Cathy H. Xia, Zhen Liu
SIGSOFT
2003
ACM
15 years 5 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...
« Prev « First page 1340 / 1395 Last » Next »