Sciweavers

1469 search results - page 166 / 294
» Characterizing the Structural Complexity of Real-World Compl...
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Trusted Storage over Untrusted Networks
We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the alge...
Paulo F. Oliveira, Luísa Lima, Tiago T. V. ...
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
14 years 3 months ago
Coordination Network Analysis: A Research Framework for Studying the Organizational Impacts of Service-Orientation in Business I
Business intelligence (BI) technology and research is maturing. In evidence, some practitioners have indicated a shift in the nature of their data warehousing challenges from bein...
Mark Keith, Haluk Demirkan, Michael Goul
PE
2006
Springer
127views Optimization» more  PE 2006»
13 years 9 months ago
Cycloid: A constant-degree and lookup-efficient P2P overlay network
There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require O(lo...
Haiying Shen, Cheng-Zhong Xu, Guihai Chen
ICASSP
2011
IEEE
13 years 24 days ago
Joint bandwidth and power allocation in cognitive radio networks under fading channels
A problem of joint optimal bandwidth and power allocation in cognitive networks under fading channels is considered. It is assumed that multiple secondary users (SUs) share the sp...
Xiaowen Gong, Sergiy A. Vorobyov, Chintha Tellambu...
WORDS
2005
IEEE
14 years 2 months ago
Virtual Networks in an Integrated Time-Triggered Architecture
Depending on the physical structuring of large distributed safety-critical real-time systems, one can distinguish federated and integrated system architectures. This paper investi...
Roman Obermaisser, Philipp Peti, Hermann Kopetz