Sciweavers

2044 search results - page 317 / 409
» System theory for numerical analysis
Sort
View
ICN
2009
Springer
15 years 10 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
IWCMC
2009
ACM
15 years 10 months ago
I-PMIP: an inter-domain mobility extension for proxy-mobile IP
Proxy Mobile IP (PMIP) provides a solution for networkbased localized mobility management which in contrast to host-based mobility solutions, like Mobile IP (MIP), does not requir...
Niklas Neumann, Jun Lei, Xiaoming Fu, Gong Zhang
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 10 months ago
Cognitive Radio with Secondary Packet-By-Packet Vertical Handover
– According to the commons model of cognitive radio, the activity of secondary (unlicensed) nodes is required to guarantee quality-of-service (QoS) constraints on the transmissio...
Jonathan Gambini, Osvaldo Simeone, Umberto Spagnol...
ICC
2008
IEEE
122views Communications» more  ICC 2008»
15 years 10 months ago
Multi-Carrier Transmission with Limited Feedback: Power Loading over Sub-Channel Groups
— Feedback of channel state information (CSI) enables a multi-carrier transmitter to optimize the power allocation across sub-channels. We consider a single user feedback scheme ...
Manish Agarwal, Dongning Guo, Michael L. Honig
ICRA
2008
IEEE
136views Robotics» more  ICRA 2008»
15 years 10 months ago
Multi-agent probabilistic search in a sequential decision-theoretic framework
— Consider the task of searching a region for the presence or absence of a target using a team of multiple searchers. This paper formulates this search problem as a sequential pr...
Timothy H. Chung, Joel W. Burdick