Sciweavers

3161 search results - page 521 / 633
» Documenting framework behavior
Sort
View
VTC
2006
IEEE
15 years 8 months ago
Performance Comparison of OFDM-TDMA and OFDMA with Cross-Layer Consideration
— Performance comparison of multiuser OFDM-TDMA and OFDMA systems by considering physical and link cross-layer behavior is conducted in this work. We provide a new framework for ...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
116
Voted
DOLAP
2006
ACM
15 years 8 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli
INFOSCALE
2006
ACM
15 years 8 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
OZCHI
2006
ACM
15 years 8 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
120
Voted
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
15 years 8 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner