Sciweavers

1774 search results - page 37 / 355
» The Networked Semantic Desktop
Sort
View
LCN
2008
IEEE
15 years 5 months ago
Managing energy use in a network with a new SNMP Power State MIB
— Energy consumption has become a major factor in the total cost of ownership (TCO) of IT equipment. The power state of IT equipment is effectively “invisible” to the network...
Francisco Blanquicet, Kenneth J. Christensen
PEWASUN
2004
ACM
15 years 4 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 3 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
DSOM
1999
Springer
15 years 3 months ago
JAMAP: A Web-based Management Platform for IP Networks
In this paper, we describe JAMAP, a prototype of a Web-based management platform for IP networks. It is written entirely in Java. It implements the push model to perform regular ma...
Jean-Philippe Martin-Flatin, Laurent Bovet, Jean-P...
DBISP2P
2003
Springer
92views Database» more  DBISP2P 2003»
15 years 4 months ago
Semantic Overlay Clusters within Super-Peer Networks
When joining information provider peers to a peer-to-peer network, an arbitrary distribution is sub-optimal. In fact, clustering peers by their characteristics, enhances search and...
Alexander Löser, Felix Naumann, Wolf Siberski...