Sciweavers

5512 search results - page 1070 / 1103
» Mobile networks unplugged
Sort
View
SRDS
1999
IEEE
13 years 12 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
ICSE
1999
IEEE-ACM
13 years 12 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
EUROMICRO
1997
IEEE
13 years 11 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
AAIM
2007
Springer
120views Algorithms» more  AAIM 2007»
13 years 11 months ago
Online OVSF Code Assignment with Resource Augmentation
Abstract. Orthogonal Variable Spreading Factor (OVSF) code assignment is a fundamental problem in Wideband Code-Division MultipleAccess (W-CDMA) systems, which play an important ro...
Francis Y. L. Chin, Yong Zhang, Hong Zhu
CNSR
2010
IEEE
140views Communications» more  CNSR 2010»
13 years 11 months ago
Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2
—MANET routing protocols are designed to scale up to thousands of routers with frequent changes of the topology. In preference, MANET routing protocols should also support constr...
Ulrich Herberg
« Prev « First page 1070 / 1103 Last » Next »