Sciweavers

628 search results - page 123 / 126
» On Designing and Deploying Internet-Scale Services
Sort
View
ACSC
2004
IEEE
13 years 11 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
EENERGY
2010
13 years 10 months ago
Energy-aware traffic engineering
Energy consumption of the Internet is already substantial and it is likely to increase as operators deploy faster equipment to handle popular bandwidthintensive services, such as ...
Nedeljko Vasic, Dejan Kostic
WSC
2004
13 years 8 months ago
Impact of Production Run Length on Supply Chain Performance
This paper documents an experiment designed to show the value of simulation in understanding the relationship between production run lengths and overall supply chain performance. ...
David J. Parsons, Robin J. Clark, Kevin L. Payette
COMCOM
2008
111views more  COMCOM 2008»
13 years 7 months ago
An admission control algorithm for multi-hop 802.11e-based WLANs
Recently, wireless local area network (WLAN) hotspots have been deployed in many areas (e.g., cafes, airports, university campuses). The new IEEE 802.11e standard further provides...
Yuxia Lin, Vincent W. S. Wong
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 7 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...