Sciweavers

18209 search results - page 3554 / 3642
» Some Remarks on the Paper
Sort
View
AC
2004
Springer
13 years 8 months ago
The Timeboxing process model for iterative software development
In today's business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effectiv...
Pankaj Jalote, Aveejeet Palit, Priya Kurien
JPDC
2007
117views more  JPDC 2007»
13 years 8 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
TSP
2008
115views more  TSP 2008»
13 years 8 months ago
Approximation Bounds for Semidefinite Relaxation of Max-Min-Fair Multicast Transmit Beamforming Problem
Consider a downlink multicast scenario where a base station equipped with multiple antennas wishes to simultaneously broadcast a number of signals to some given groups of users ove...
Tsung-Hui Chang, Zhi-Quan Luo, Chong-Yung Chi
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
JPDC
2007
184views more  JPDC 2007»
13 years 8 months ago
Modeling of concurrent web sessions with bounded inconsistency in shared data
Client interactions with modern web-accessible network services are typically organized into sessions involving multiple requests that read and write shared application data. Ther...
Alexander Totok, Vijay Karamcheti
« Prev « First page 3554 / 3642 Last » Next »