Sciweavers

1799 search results - page 290 / 360
» Active Objects in TMN
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
AVSS
2007
IEEE
15 years 10 months ago
On the effect of motion segmentation techniques in description based adaptive video transmission
This paper presents the results of analysing the effect of different motion segmentation techniques in a system that transmits the information captured by a static surveillance ca...
Juan Carlos San Miguel, José María M...
CEC
2007
IEEE
15 years 10 months ago
Light beam search based multi-objective optimization using evolutionary algorithms
Abstract— For the past decade or so, evolutionary multiobjective optimization (EMO) methodologies have earned wide popularity for solving complex practical optimization problems,...
Kalyanmoy Deb, Abhay Kumar
INFOCOM
2007
IEEE
15 years 10 months ago
Exploiting Hidden Convexity For Flexible And Robust Resource Allocation In Cellular Networks
— A systematic approach to solve seemingly nonconvex resource allocation problems in wireless cellular networks is studied in this paper. By revealing and exploiting the hidden c...
Chee-Wei Tan, Daniel Pérez Palomar, Mung Ch...
IPPS
2007
IEEE
15 years 10 months ago
Model-Driven Performance Analysis Methodology for Distributed Software Systems
Abstract— A key enabler of the recently popularized, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reu...
Swapna S. Gokhale, Paul J. Vandal, Aniruddha S. Go...