Sciweavers

6122 search results - page 1142 / 1225
» Securing network access in wireless sensor networks
Sort
View
SISW
2003
IEEE
15 years 3 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
CLUSTER
2005
IEEE
15 years 3 months ago
Fast Query Processing by Distributing an Index over CPU Caches
Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree str...
Xiaoqin Ma, Gene Cooperman
CHI
2006
ACM
15 years 10 months ago
Broken expectations in the digital home
As part of an ongoing effort to understand ease of use of digital home technologies, we undertook an exploratory study of people who use their home networks for more than just bro...
Sara A. Bly, Bill N. Schilit, David W. McDonald, B...
PERCOM
2003
ACM
15 years 9 months ago
Self-Adaptive Leasing for Jini
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Kevin Bowers, Kevin Mills, Scott Rose
ICNP
2007
IEEE
15 years 4 months ago
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA
—FRASA, Feedback Retransmission Approximation for Slotted ALOHA, is proposed to study the stability region of finiteuser slotted ALOHA under collision channel. With FRASA, the s...
Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau
« Prev « First page 1142 / 1225 Last » Next »