Sciweavers

819 search results - page 126 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SIGCOMM
2012
ACM
13 years 4 days ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
TMC
2010
115views more  TMC 2010»
14 years 8 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
91
Voted
TPDS
2008
202views more  TPDS 2008»
14 years 9 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
ICW
2005
IEEE
117views Communications» more  ICW 2005»
15 years 3 months ago
Implementation Issues of Managed Bandwidth Service: The Case of GRNET
This paper describes the design and the implementation of the Managed Bandwidth Service (MBS) in a high speed backbone network as well as a management tool for the service. The se...
Christos Bouras, Dimitris Primpas
AAMAS
2004
Springer
14 years 9 months ago
Functional Validation in Grid Computing
The development of the World Wide Web has changed the way we think about information. Information on the web is distributed, updates are made asynchronously and resources come onli...
Guofei Jiang, George Cybenko