Sciweavers

294 search results - page 50 / 59
» Analyzing Consistency of Security Policies
Sort
View
PIMRC
2010
IEEE
13 years 4 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
MM
2000
ACM
217views Multimedia» more  MM 2000»
13 years 11 months ago
Design and implementation of the parallel multimedia file system based on message distribution
The two-layered distributed clustered server architecture consisting of a control server and a group of storage servers has been widely used to support multimedia file systems. Wi...
Seung-Ho Park, Si-Yong Park, Gwang Moon Kim, Ki-Do...
SIGECOM
2000
ACM
227views ECommerce» more  SIGECOM 2000»
13 years 11 months ago
Combinatorial auctions for supply chain formation
Supply chain formation presents difficult coordination issues for distributed negotiation protocols. Agents must simultaneously negotiate production relationships at multiple lev...
William E. Walsh, Michael P. Wellman, Fredrik Ygge
ELPUB
2008
ACM
13 years 7 months ago
Consortial Use of Electronic Journals in Turkish Universities
The use of electronic journals has outnumbered that of printed journals within the last decade. The consortial use of electronic journals through publishers’ or aggregators’ w...
Yasar Tonta, Yurdagül Ünal
JAIR
2008
130views more  JAIR 2008»
13 years 6 months ago
Online Planning Algorithms for POMDPs
Partially Observable Markov Decision Processes (POMDPs) provide a rich framework for sequential decision-making under uncertainty in stochastic domains. However, solving a POMDP i...
Stéphane Ross, Joelle Pineau, Sébast...