Sciweavers

661 search results - page 112 / 133
» Bandwidth Sharing: Objectives and Algorithms
Sort
View
CASES
2003
ACM
14 years 3 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
PC
2008
123views Management» more  PC 2008»
13 years 9 months ago
The impact of heterogeneity on master-slave scheduling
In this paper, we assess the impact of heterogeneity on scheduling independent tasks on master-slave platforms. We assume a realistic one-port model where the master can communica...
Jean-Francois Pineau, Yves Robert, Fréd&eac...
SODA
2010
ACM
208views Algorithms» more  SODA 2010»
14 years 7 months ago
Correlation Robust Stochastic Optimization
We consider a robust model proposed by Scarf, 1958, for stochastic optimization when only the marginal probabilities of (binary) random variables are given, and the correlation be...
Shipra Agrawal, Yichuan Ding, Amin Saberi, Yinyu Y...
SDM
2009
SIAM
114views Data Mining» more  SDM 2009»
14 years 7 months ago
Top-k Correlative Graph Mining.
Correlation mining has been widely studied due to its ability for discovering the underlying occurrence dependency between objects. However, correlation mining in graph databases ...
Yiping Ke, James Cheng, Jeffrey Xu Yu
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 4 months ago
Maximizing Throughput of Cognitive Radio Networks with Limited Primary Users' Cooperation
— We consider a point-to-multipoint cognitive radio network that shares a set of channels with a primary network. Within the cognitive radio network, a base station (BS) controls...
Anh Tuan Hoang, Ying-Chang Liang, Habibul Islam