Sciweavers

421 search results - page 53 / 85
» Optimal Trust Network Analysis with Subjective Logic
Sort
View
PASTE
2010
ACM
13 years 6 months ago
Property-aware program sampling
Monitoring or profiling programs provides us with an understanding for its further improvement and analysis. Typically, for monitoring or profiling, the program is instrumented ...
Harish Narayanappa, Mukul S. Bansal, Hridesh Rajan
MOBICOM
2006
ACM
14 years 1 months ago
On the complexity of scheduling in wireless networks
We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of K-hop interference m...
Gaurav Sharma, Ravi R. Mazumdar, Ness B. Shroff
MOBIHOC
2006
ACM
14 years 7 months ago
Balancing distance and lifetime in delay constrained ad hoc networks
This paper addresses the problem of optimizing the packet transmission schedule in an ad hoc network with end-toend delay constraints. The emphasis is to determine the proper rela...
Ben Liang, Min Dong
PEWASUN
2005
ACM
14 years 1 months ago
Weak signal detection performance of selective rake receivers in fading channels
We derive the optimum and suboptimum selective rake receivers (SRRs) for fading environment exhibiting impulsive nature. Simulation results confirm that, when the noise is impuls...
Jinsoo Bae, Sang Won Choi, So Ryoung Park, Jongho ...
SIGMETRICS
2010
ACM
227views Hardware» more  SIGMETRICS 2010»
14 years 11 days ago
Characterizing and modeling user activity on smartphones: summary
In this paper, we present a comprehensive analysis of real smartphone usage during a 6-month study of real user activity on the Android G1 smartphone. Our goal is to study the hig...
Alex Shye, Benjamin Scholbrock, Gokhan Memik, Pete...