Sciweavers

1030 search results - page 83 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
EDOC
2004
IEEE
14 years 19 days ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
PERCOM
2006
ACM
14 years 8 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki
DPD
2006
123views more  DPD 2006»
13 years 9 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
TWC
2008
188views more  TWC 2008»
13 years 8 months ago
Joint power control and beamforming for cognitive radio networks
We consider a secondary usage of spectrum scenario where a secondary network coexists and/or shares the radio spectrum with a primary network to which the spectrum is licensed. The...
Habibul Islam, Ying-Chang Liang, Anh Tuan Hoang
INFOCOM
2009
IEEE
14 years 3 months ago
On the Exploitation of CDF Based Wireless Scheduling
—Channel-aware scheduling strategies - such as the CDF Scheduler (CS) algorithm for the CDMA/HDR systems provide an effective mechanism for utilizing the channel data rate for im...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy