Sciweavers

14824 search results - page 2720 / 2965
» Security - Introduction
Sort
View
CLUSTER
2006
IEEE
15 years 3 months ago
Distributed File System Virtualization Techniques Supporting On-Demand Virtual Machine Environments for Grid Computing
This paper presents a data management solution which allows fast Virtual Machine (VM) instantiation and efficient run-time execution to support VMs as execution environments in Gri...
Ming Zhao 0002, Jian Zhang 0005, Renato J. O. Figu...
CN
2006
124views more  CN 2006»
15 years 3 months ago
Packet classification using diagonal-based tuple space search
Multidimensional packet classification has attracted considerable research interests in the past few years due to the increasing demand on policy based packet forwarding and secur...
Fu-Yuan Lee, Shiuh-Pyng Shieh
COMCOM
2006
150views more  COMCOM 2006»
15 years 3 months ago
Energy-efficient coverage problems in wireless ad-hoc sensor networks
Wireless sensor networks constitute the platform of a broad range of applications related to national security, surveillance, military, health care, and environmental monitoring. ...
Mihaela Cardei, Jie Wu
COMCOM
2006
154views more  COMCOM 2006»
15 years 3 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
COMCOM
2006
148views more  COMCOM 2006»
15 years 3 months ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
« Prev « First page 2720 / 2965 Last » Next »