Sciweavers

224 search results - page 42 / 45
» Policy Specification for Programmable Networks
Sort
View
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
15 years 2 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
125
Voted
ANCS
2010
ACM
14 years 6 months ago
An architecture for software defined cognitive radio
As we move forward towards the next generation of wireless protocols, the push for a better radio physical layer is ever increasing. Conventional radio architectures are limited t...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
CCS
2008
ACM
14 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
WEBNET
2000
14 years 10 months ago
How the Wild Wide Web was Won: Online Web Developer Training
: As the Web grows in importance in institutional settings, so does the need for training. Universities are looking at the daunting task of putting more information and services on...
John Sharkey, Kitzzy Aviles, Barbara Ferguson
JCO
2006
106views more  JCO 2006»
14 years 9 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang