Sciweavers

5410 search results - page 1068 / 1082
» When to Cross Over
Sort
View
TMC
2010
86views more  TMC 2010»
13 years 4 months ago
Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations
Although the EDCA access mechanism of the 802.11e standard supports legacy DCF stations, the presence of DCF stations in the WLAN jeopardizes the provisioning of the service guaran...
Albert Banchs, Pablo Serrano, Luca Vollero
TWC
2010
13 years 4 months ago
Cooperative wireless multicast: performance analysis and power/location optimization
The popularity of multimedia multicast/broadcast applications over wireless networks makes it critical to address the error-prone, heterogeneous and dynamically changing nature of ...
H. Vicky Zhao, Weifeng Su
AAMAS
2011
Springer
13 years 4 months ago
Aggregating value ranges: preference elicitation and truthfulness
We study the case where agents have preferences over ranges (intervals) of values, and we wish to elicit and aggregate these preferences. For example, consider a set of climatologi...
Joseph Farfel, Vincent Conitzer
CCGRID
2011
IEEE
13 years 1 months ago
High Performance Pipelined Process Migration with RDMA
—Coordinated Checkpoint/Restart (C/R) is a widely deployed strategy to achieve fault-tolerance. However, C/R by itself is not capable enough to meet the demands of upcoming exasc...
Xiangyong Ouyang, Raghunath Rajachandrasekar, Xavi...
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 1 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
« Prev « First page 1068 / 1082 Last » Next »