Sciweavers

216 search results - page 38 / 44
» Model based estimation and verification of mobile device per...
Sort
View
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
MA
2010
Springer
150views Communications» more  MA 2010»
13 years 2 months ago
Cokriging for spatial functional data
This work proposes to generalize the method of cokriging when data are spatially sampled curves. A spatial functional linear model is constructed including spatial dependencies be...
David Nerini, Pascal Monestiez, Claude Manté...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 7 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
CISS
2010
IEEE
12 years 11 months ago
Self-organizing Dynamic Fractional Frequency Reuse on the uplink of OFDMA systems
Reverse link (or uplink) performance of cellular systems is becoming increasingly important with the emergence of new uplink-bandwidth intensive applications such as Video Share [...
Balaji Rengarajan, Alexander L. Stolyar, Harish Vi...
SIGMETRICS
1997
ACM
164views Hardware» more  SIGMETRICS 1997»
13 years 12 months ago
File Server Scaling with Network-Attached Secure Disks
By providing direct data transfer between storage and client, network-attached storage devices have the potential to improve scalability for existing distributed file systems (by...
Garth A. Gibson, David Nagle, Khalil Amiri, Fay W....