Sciweavers

3638 search results - page 614 / 728
» Optimization via communication networks
Sort
View
PERCOM
2009
ACM
14 years 4 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
NCA
2009
IEEE
14 years 4 months ago
A Distributed Algorithm for Web Content Replication
—Web caching and replication techniques increase accessibility of Web contents and reduce Internet bandwidth requirements. In this paper, we are considering the replica placement...
Sharrukh Zaman, Daniel Grosu
ADHOCNOW
2008
Springer
14 years 4 months ago
Local Maximal Matching and Local 2-Approximation for Vertex Cover in UDGs
We present 1 − approximation algorithms for the maximum matching problem in location aware unit disc graphs and in growth-bounded graphs. The algorithm for unit disk graph is loc...
Andreas Wiese, Evangelos Kranakis
VTC
2007
IEEE
131views Communications» more  VTC 2007»
14 years 3 months ago
FSMA - A Topology-Transparent Scheme for Opportunistic Spectrum Access
— With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spec...
Hwee Pink Tan, Colman O'Sullivan, Linda Doyle
GLOBECOM
2006
IEEE
14 years 3 months ago
Bandwidth Constraint Models: A Performance Study with Preemption on Link Failures
— Bandwidth constraint models have been a topic of intense discussions at the IETF meetings. Three conventional methods have been described in informational IETF RFCs and their p...
Joshua B. Goldberg, Sukrit Dasgupta, Jaudelice Cav...