Sciweavers

1517 search results - page 133 / 304
» Time and Location Based Services with Access Control
Sort
View
GCC
2003
Springer
15 years 3 months ago
Dynamic Data Grid Replication Strategy Based on Internet Hierarchy
Abstract. In data grid, large quantity of data files is produced and data replication is applied to reduce data access time. Efficiently utilizing grid resources becomes important ...
Sang-Min Park, Jai-Hoon Kim, Young-Bae Ko, Won-Sik...
MMNS
2001
151views Multimedia» more  MMNS 2001»
14 years 11 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
PIMRC
2008
IEEE
15 years 4 months ago
The Wireless Engset Multi-Rate Loss Model for the Handoff traffic analysis in W-CDMA networks
—The call-level performance modelling and evaluation of 3G cellular networks is important for the proper network dimensioning and efficient use of the network resources, such as ...
Vassilios G. Vassilakis, Michael D. Logothetis
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
15 years 4 months ago
Transaction Time Support Inside a Database Engine
Transaction time databases retain and provide access to prior states of a database. An update “inserts” a new record while preserving the old version. Immortal DB builds trans...
David B. Lomet, Roger S. Barga, Mohamed F. Mokbel,...