Sciweavers

517 search results - page 61 / 104
» UMAS Learning Requirement for Controlling Network Resources
Sort
View
PIMRC
2008
IEEE
14 years 2 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
JSAC
2011
171views more  JSAC 2011»
12 years 10 months ago
QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks
—In this paper, we propose a spectrum allocation framework that jointly considers the Quality-of-Service (QoS) provisioning for heterogeneous secondary Real-Time (RT) and Non-Rea...
Ammar Alshamrani, Xuemin (Sherman) Shen, Liang-Lia...
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
14 years 1 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 1 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
POLICY
2007
Springer
14 years 1 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...