Sciweavers

113 search results - page 5 / 23
» Operator and radio resource sharing in multi-carrier environ...
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
WINET
2010
120views more  WINET 2010»
13 years 6 months ago
Link adaptation algorithms for improved delivery of delay- and error-sensitive packet-data services over wireless networks
Abstract Link Adaptation is a radio resource management technique that assesses the channel conditions and selects a transport mode, from a set of possible options, which is optimi...
Miguel López-Benítez, Javier Goz&aac...
ETT
2010
227views Education» more  ETT 2010»
13 years 2 months ago
Throughput enhancement through femto-cell deployment
This paper studies the impact of femto-cell underlay deployment that share radio frequency resources with urban macro-cells. Due to the random and uncoordinated deployment, femto-c...
Zubin Bharucha, Harald Haas, Andreas Saul, Gunther...
WOSP
2005
ACM
14 years 1 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...
FAST
2009
13 years 5 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger