Sciweavers

7271 search results - page 1259 / 1455
» Fault-Tolerant Distributed Simulation
Sort
View
IDEAL
2010
Springer
13 years 8 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
IEEECIT
2010
IEEE
13 years 8 months ago
Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc Grid
Mobile ad-hoc Grid is one of the modern distributed systems that have been introduced until now. It combines traditional grid capabilities with ad-hoc network flexibilities. Servic...
Askari Parichehreh, Bahman Javadi, Mehdi Sarikhani...
INFOCOM
2010
IEEE
13 years 8 months ago
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, pri...
Jieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, D...
INFOCOM
2010
IEEE
13 years 8 months ago
Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks
Recently, a cooperative paradigm for single-channel cognitive radio networks has been advocated, where primary users can leverage secondary users to relay their traffic. However, i...
Hong Xu, Baochun Li
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
13 years 8 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
« Prev « First page 1259 / 1455 Last » Next »