Sciweavers

391 search results - page 61 / 79
» Impact of Information on Network Performance - An Informatio...
Sort
View
WWIC
2005
Springer
112views Communications» more  WWIC 2005»
14 years 1 months ago
Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode
A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each Base Station (BS), and associated Su...
Omar Ashagi, Seán Murphy, Liam Murphy
TNN
2008
114views more  TNN 2008»
13 years 7 months ago
Relevance-Based Feature Extraction for Hyperspectral Images
Abstract--Hyperspectral imagery affords researchers all discriminating details needed for fine delineation of many material classes. This delineation is essential for scientific re...
Michael J. Mendenhall, Erzsébet Meré...
IMC
2004
ACM
14 years 1 months ago
The root of the matter: hints or slaves
We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
David Malone
IPPS
1997
IEEE
13 years 12 months ago
Dynamic Processor Scheduling with Client Resources for Fast Multi-Resolution WWW Image Browsing
WWW-based Internet information service has grown enormously during the last few years, and major performance bottlenecks have been caused by WWW server and Internet bandwidth inad...
Daniel Andresen, Tao Yang, David Watson, Athanassi...
ACSAC
1999
IEEE
13 years 12 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti