Sciweavers

3031 search results - page 79 / 607
» SNMS - Shadow Network Management System
Sort
View
141
Voted
JUCS
2002
116views more  JUCS 2002»
15 years 3 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
129
Voted
AINA
2007
IEEE
15 years 10 months ago
Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...
Bin Guo, Michita Imai
130
Voted
CACM
1999
108views more  CACM 1999»
15 years 3 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld
98
Voted
AUTONOMICS
2007
ACM
15 years 7 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...