Sciweavers

5891 search results - page 1111 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
COMPGEOM
2006
ACM
15 years 10 months ago
Algorithms for two-box covering
We study the problem of covering a set of points or polyhedra in 3 with two axis-aligned boxes in order to minimize a function of the measures of the two boxes, such as the sum or...
Esther M. Arkin, Gill Barequet, Joseph S. B. Mitch...
CCGRID
2005
IEEE
15 years 10 months ago
Mapping DAG-based applications to multiclusters with background workload
Before an application modelled as a Directed Acyclic Graph (DAG) is executed on a heterogeneous system, a DAG mapping policy is often enacted. After mapping, the tasks (in the DAG...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, D...
178
Voted
WMASH
2004
ACM
15 years 10 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
WICON
2008
15 years 6 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
TCSV
2010
14 years 11 months ago
No-Reference Quality Assessment of H.264/AVC Encoded Video
Abstract--This paper proposes a no-reference quality assessment metric for digital video subject to H.264/AVC encoding. The proposed metric comprises two main steps: coding error e...
Tomás Brandão, Tiago Rosa Maria Paul...
« Prev « First page 1111 / 1179 Last » Next »