Sciweavers

2742 search results - page 405 / 549
» Business Service Scheduling
Sort
View
146
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Dependable k-coverage algorithms for sensor networks
– Redundant sensing capabilities are often required in sensor network applications due to various reasons, e.g. robustness, fault tolerance, or increased accuracy. At the same ti...
Simon Gyula, Miklós Molnár, Lá...
133
Voted
JSAC
2006
103views more  JSAC 2006»
15 years 3 months ago
Quality-of-service provisioning and efficient resource utilization in CDMA cellular communications
One of the major challenges in supporting multimedia services over Internet protocol (IP)-based code-division multiple-access (CDMA) wireless networks is the quality-of-service (Qo...
Hai Jiang, Weihua Zhuang, Xuemin Shen, Qi Bi
118
Voted
CN
2004
86views more  CN 2004»
15 years 3 months ago
Management of abusive and unfair Internet access by quota-based priority control
In a free of charge or flat-rate Internet access environment, there often exists abusive and unfair usage of network resources. In this paper, the Internet access by the dormitory...
Tsung-Ching Lin, Yeali S. Sun, Shi-Chung Chang, Sh...
COMCOM
2004
79views more  COMCOM 2004»
15 years 3 months ago
Fair bandwidth sharing between unicast and multicast flows in best-effort networks
In this paper, we propose a simple scheduler called SBQ (Service-Based Queuing) to share the bandwidth fairly between unicast and multicast flows according to a new definition of ...
Fethi Filali, Walid Dabbous
130
Voted
CN
2002
91views more  CN 2002»
15 years 3 months ago
VERA: an extensible router architecture
We recognize two trends in router design: increasing pressure to extend the set of services provided by the router and increasing diversity in the hardware components used to cons...
Scott Karlin, Larry L. Peterson