Sciweavers

186 search results - page 35 / 38
» Achievable Capacity Under the Interference Temperature Model
Sort
View
IPSN
2004
Springer
14 years 26 days ago
An energy-aware data-centric generic utility based approach in wireless sensor networks
Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and energyconstrained in nature. In this paper, formulate t...
Wei-Peng Chen, Lui Sha
VLDB
1997
ACM
99views Database» more  VLDB 1997»
13 years 11 months ago
Resource Scheduling in Enhanced Pay-Per-View Continuous Media Databases
The enhanced pay-per-view (EPPV) model for providing continuous-media-on-demand(CMOD) services associates with each continuous media clip a display frequency that dependson the cl...
Minos N. Garofalakis, Banu Özden, Abraham Sil...
PE
2008
Springer
113views Optimization» more  PE 2008»
13 years 7 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
ICONIP
2010
13 years 6 months ago
Learning Shapes Bifurcations of Neural Dynamics upon External Stimuli
Memory is often considered to be embedded into one of the attractors in neural dynamical systems, which provides an appropriate output depending on the initial state specified by ...
Tomoki Kurikawa, Kunihiko Kaneko
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...