Sciweavers

17329 search results - page 3442 / 3466
» Improved non-approximability results
Sort
View
JPDC
2006
141views more  JPDC 2006»
13 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
JSA
2006
94views more  JSA 2006»
13 years 9 months ago
An abstraction model for a Grid execution framework
action Model for a Grid Execution Framework Kaizar Amin,c,a Gregor von Laszewski,,a,b Mihael Hategan,b,a Rashid Al-Ali,d Omer Rana,d and David Walkerc aArgonne National Laboratory,...
Kaizar Amin, Gregor von Laszewski, Mihael Hategan,...
JSAC
2006
112views more  JSAC 2006»
13 years 9 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...
JSAC
2006
124views more  JSAC 2006»
13 years 9 months ago
A game-theoretic approach to energy-efficient power control in multicarrier CDMA systems
A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power control is modeled as a noncooperative game in which each...
Farhad Meshkati, Mung Chiang, H. Vincent Poor, Stu...
MONET
2008
77views more  MONET 2008»
13 years 9 months ago
On Relay Node Placement and Assignment for Two-tiered Wireless Networks
Wireless networks that operate on batteries are imposed with energy constraints and long distance communications between nodes are not desirable. Implementing Relay Nodes (RNs) can...
Wenxuan Guo, Xin-Ming Huang, Wenjing Lou, Cao Lian...
« Prev « First page 3442 / 3466 Last » Next »