Sciweavers

517 search results - page 76 / 104
» UMAS Learning Requirement for Controlling Network Resources
Sort
View
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
14 years 1 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
SIGCPR
2006
ACM
166views Hardware» more  SIGCPR 2006»
14 years 1 months ago
Podcasting in academia: a new knowledge management paradigm within academic settings
Podcasting represents a new and exciting learning paradigm within an academic setting. Materials such conference reports, research manuscripts, and course lectures can be recorded...
Peter Ractham, Xuesong Zhang
CDC
2008
IEEE
149views Control Systems» more  CDC 2008»
13 years 9 months ago
Distributed computation under bit constraints
Abstract-- A network of nodes communicate via noisy channels. Each node has some real-valued initial measurement or message. The goal of each of the nodes is to acquire an estimate...
Ola Ayaso, Devavrat Shah, Munther A. Dahleh
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 1 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 2 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...