Sciweavers

493 search results - page 27 / 99
» Final exam scheduler - FES
Sort
View
TWC
2008
99views more  TWC 2008»
13 years 10 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
15 years 18 days ago
Best-Effort Top-k Query Processing Under Budgetary Constraints
Abstract-- We consider a novel problem of top-k query processing under budget constraints. We provide both a framework and a set of algorithms to address this problem. Existing alg...
Michal Shmueli-Scheuer, Chen Li, Yosi Mass, Haggai...
INFOCOM
2009
IEEE
14 years 5 months ago
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol
—In this paper, we propose the Staggered TDMA Underwater MAC Protocol (STUMP), a scheduled, collision free TDMA-based MAC protocol that leverages node position diversity and the ...
Kurtis B. Kredo II, Petar Djukic, Prasant Mohapatr...
HASE
2007
IEEE
14 years 5 months ago
Design of a Fairness Guarantee Mechanism Based on Network Measurement
In this paper we discuss the problem of network fairness. Traditional network fairness focuses on treating uneven resource (such as bandwidth) allocation in TCP congestion control...
Xin Wang, Xiaochen Zhang, Shuang Yang, Xiangyang X...
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 5 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux