Sciweavers

224 search results - page 15 / 45
» Auctions with Severely Bounded Communication
Sort
View
GI
2010
Springer
13 years 5 months ago
Reusable Interaction Protocols for Workflows
With the advent of collaborative business processes that may include different parties, the interaction means between those processes steadily gains more importance. Despite this i...
Alexander Pokahr, Lars Braubach
GLOBECOM
2007
IEEE
14 years 1 months ago
Performance Analysis of Orthogonal Space Time Block Coding over Hoyt Fading Channels
—In this paper, a novel error probability analysis of orthogonal space-time block coding (OSTBC) over independent but not necessarily identical Hoyt (Nakagami-q) fading channels ...
George A. Ropokis, Athanasios A. Rontogiannis, P. ...
GLOBECOM
2006
IEEE
14 years 1 months ago
Delay Analysis and Comparison of OFDM-TDMA and OFDMA under IEEE 802.16 QoS Framework
Abstract— The delay analysis and comparison of OFDMTDMA and OFDMA using a flow control scheme under the QoS framework of IEEE 802.16 are conducted in this work. We investigate t...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
INFOCOM
1992
IEEE
13 years 11 months ago
Topological Design of Interconnected LAN-MAN Networks
This paper describes a methodology for designing interconnected LAN-MAN networks with the objective of minimizing the average network delay. We consider IEEE 802.3-5 LANs intercon...
Cem Ersoy, Shivendra S. Panwar
GLOBECOM
2006
IEEE
14 years 1 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...