Sciweavers

7271 search results - page 1259 / 1455
» Fault-Tolerant Distributed Simulation
Sort
View
140
Voted
IDEAL
2010
Springer
15 years 13 days ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
147
Voted
IEEECIT
2010
IEEE
15 years 13 days ago
Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc Grid
Mobile ad-hoc Grid is one of the modern distributed systems that have been introduced until now. It combines traditional grid capabilities with ad-hoc network flexibilities. Servic...
Askari Parichehreh, Bahman Javadi, Mehdi Sarikhani...
INFOCOM
2010
IEEE
15 years 13 days ago
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, pri...
Jieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, D...
INFOCOM
2010
IEEE
15 years 13 days ago
Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks
Recently, a cooperative paradigm for single-channel cognitive radio networks has been advocated, where primary users can leverage secondary users to relay their traffic. However, i...
Hong Xu, Baochun Li
170
Voted
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
15 years 12 days ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
« Prev « First page 1259 / 1455 Last » Next »