Sciweavers

4250 search results - page 784 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
GRID
2006
Springer
13 years 9 months ago
Fault-aware scheduling for Bag-of-Tasks applications on Desktop Grids
Desktop Grids have proved to be a suitable platform for the execution of Bag-of-Tasks applications but, being characterized by a high resource volatility, require the availability ...
Cosimo Anglano, John Brevik, Massimo Canonico, Dan...
ISCI
2008
86views more  ISCI 2008»
13 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
JAIR
2006
101views more  JAIR 2006»
13 years 9 months ago
Resource Allocation Among Agents with MDP-Induced Preferences
Allocating scarce resources among agents to maximize global utility is, in general, computationally challenging. We focus on problems where resources enable agents to execute acti...
Dmitri A. Dolgov, Edmund H. Durfee
JSAC
2006
170views more  JSAC 2006»
13 years 9 months ago
Cross-Layer design in HSDPA system to reduce the TCP effect
This paper focuses on the interaction between the Transport Control Protocol (TCP) layer and the radio interface in the High Speed Downlink Packet Access (HSDPA) wireless system. I...
Mohamad Assaad, Djamal Zeghlache
IJCV
2007
148views more  IJCV 2007»
13 years 9 months ago
Detection and Tracking of Multiple Metallic Objects in Millimetre-Wave Images
Abstract In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave (MMW) images. The...
Christopher D. Haworth, Yves de Saint-Pern, D. Cla...