Sciweavers

6693 search results - page 35 / 1339
» On an anytime algorithm for control
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 6 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
13 years 11 months ago
A mathematical model of the Skype VoIP congestion control algorithm
The Internet is changing from being only an efficient platform for data delivery to become also a platform for audio/video applications. The stability of the traditional Internet i...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano
SSDBM
2007
IEEE
104views Database» more  SSDBM 2007»
14 years 3 months ago
Reservoir Sampling over Memory-Limited Stream Joins
In stream join processing with limited memory, uniform random sampling is useful for approximate query evaluation. In this paper, we address the problem of reservoir sampling over...
Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wa...
ICCSA
2007
Springer
14 years 3 months ago
Low-Complexity Unequal Packet Loss Protection for Real-Time Video over Ubiquitous Networks
Ubiquitous multimedia services are emerging to be available at anytime and anywhere using a variety of computing devices. In this paper, we propose a low-complexity unequal loss pr...
Hojin Ha, Changhoon Yim, Young Yong Kim
AMET
1998
Springer
14 years 1 months ago
Bid Evaluation and Selection in the MAGNET Automated Contracting System
We present an approach to the bid-evaluation problem in a system for multi-agent contract negotiation, called MAGNET. The MAGNET market infrastructure provides support for a variet...
Erik S. Steinmetz, John Collins, Scott Jamison, Ra...