Sciweavers

2099 search results - page 344 / 420
» Distributed constraint optimization with structured resource...
Sort
View
ICC
2008
IEEE
168views Communications» more  ICC 2008»
14 years 2 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
INFOCOM
2005
IEEE
14 years 1 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
JCDL
2005
ACM
175views Education» more  JCDL 2005»
14 years 1 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
SACMAT
2004
ACM
14 years 1 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
ISPA
2004
Springer
14 years 1 months ago
Context-Awareness in Mobile Web Services
Context-aware computing is a computing paradigm in which applications can take advantage of contextual information. Quality of network connection is a very important factor for mob...
Bo Han, Weijia Jia, Ji Shen, Man-Ching Yuen