Sciweavers

499 search results - page 79 / 100
» Performance optimizations for wireless wide-area networks: c...
Sort
View
PERCOM
2009
ACM
14 years 3 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
MOBICOM
2010
ACM
13 years 9 months ago
NVS: a virtualization substrate for WiMAX networks
This paper describes the design and implementation of a network virtualization substrate (NVS) for effective virtualization of wireless resources in WiMAX networks. Virtualization...
Ravi Kokku, Rajesh Mahindra, Honghai Zhang, Sampat...
ISCC
2007
IEEE
14 years 3 months ago
Analysis of Load Dependency of Handover Strategies in Mobile Multiaccess Ambient Networks
Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The res...
Petteri Pöyhönen, Daniel Hollos, Haitao ...
ICDE
2009
IEEE
126views Database» more  ICDE 2009»
14 years 3 months ago
Instant Advertising in Mobile Peer-to-Peer Networks
— To explore the benefit of advertising instant and location-aware commercials that can not be effectively promoted by traditional medium like TV program and Internet, we propos...
Zaiben Chen, Heng Tao Shen, Quanqing Xu, Xiaofang ...
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 3 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...