Sciweavers

2268 search results - page 449 / 454
» Modeling wireless shadow networks
Sort
View
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
14 years 3 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...
EMSOFT
2003
Springer
14 years 3 months ago
Resource Interfaces
We present a formalism for specifying component interfaces that expose component requirements on limited resources. The formalism permits an algorithmic check if two or more compon...
Arindam Chakrabarti, Luca de Alfaro, Thomas A. Hen...
JSW
2008
196views more  JSW 2008»
13 years 9 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
TIT
2008
141views more  TIT 2008»
13 years 9 months ago
Dimensionality Reduction for Distributed Estimation in the Infinite Dimensional Regime
Distributed estimation of an unknown signal is a common task in sensor networks. The scenario usually envisioned consists of several nodes, each making an observation correlated wi...
Olivier Roy, Martin Vetterli
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 4 months ago
Fairness issues in a chain of IEEE 802.11 stations
: We study a simple general scenario of ad hoc networks based on IEEE 802.11 wireless communications, consisting in a chain of transmitters, each of them being in the carrier sense...
Bertrand Ducourthial, Yacine Khaled, Stépha...