Sciweavers

15251 search results - page 2779 / 3051
» Network Science - Theory and Application
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
IPPS
2008
IEEE
15 years 10 months ago
Performance comparison of SGI Altix 4700 and SGI Altix 3700 Bx2
Suitability of the next generation of high-performance computing systems for petascale simulations will depend on a balance between factors such as processor performance, memory p...
Subhash Saini, Dennis C. Jespersen, Dale Talcott, ...
ISMAR
2008
IEEE
15 years 10 months ago
In-place Augmented Reality
In this paper we present a new vision-based approach for transmitting virtual models for Augmented Reality (AR). A two dimensional representation of the virtual models is embedded...
Nate Hagbi, Oriel Bergig, Jihad El-Sana, Klara Ked...
ISORC
2008
IEEE
15 years 10 months ago
A Flexible Trust Model for Distributed Service Infrastructures
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks, P2P, PlanetLab and Grids. In such distributed inf...
Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin
ISPAN
2008
IEEE
15 years 10 months ago
Product Line Sigraphs
Intuitively, a signed graph is a graph in which every edge is labeled with a + or − sign. For each edge, its sign represents the mode of the relationship between the vertices it...
Daniela Ferrero
« Prev « First page 2779 / 3051 Last » Next »