Sciweavers

1266 search results - page 147 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
139
Voted
IPPS
1998
IEEE
15 years 8 months ago
The Effect of the Router Arbitration Policy on the Scalability of ServerNet
In this paper we extend a previously introduced method for optimizing the arbitration policy employed by ServerNet routers and we evaluate the method's effect on scalability....
Vladimir Shurbanov, Dimiter R. Avresky, Robert W. ...
EDBT
2009
ACM
184views Database» more  EDBT 2009»
15 years 11 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer
168
Voted
WD
2010
15 years 2 months ago
Enhancing FEC application in LTE cellular networks
3rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and M...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
RTAS
2011
IEEE
14 years 7 months ago
ARCH: Practical Channel Hopping for Reliable Home-Area Sensor Networks
Abstract—Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of...
Mo Sha, Gregory Hackmann, Chenyang Lu
GLOBECOM
2006
IEEE
15 years 10 months ago
Adaptive MIMO-OFDM Cellular System with Soft Handover between Distributed Base Station Antennas
— The joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within...
Antti Tölli, Marian Codreanu, Markku J. Juntt...