Sciweavers

CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 2 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 2 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
CORR
2011
Springer
173views Education» more  CORR 2011»
13 years 2 months ago
An Adaptive Multimedia-Oriented Handoff Scheme for IEEE 802.11 WLANs
Ahmed Riadh Rebai, Saïd Hanafi
CORR
2011
Springer
152views Education» more  CORR 2011»
13 years 2 months ago
Topology Discovery of Sparse Random Graphs With Few Participants
We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. T...
Animashree Anandkumar, Avinatan Hassidim, Jonathan...
CORR
2011
Springer
182views Education» more  CORR 2011»
13 years 2 months ago
Short-Message Quantize-Forward Network Coding
—Recent work for single-relay channels shows that quantize-forward (QF) with long-message encoding achieves the same reliable rates as compress-forward (CF) with short-message en...
Gerhard Kramer, Jie Hou
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 2 months ago
Upper Bounds for Maximally Greedy Binary Search Trees
At SODA 2009, Demaine et al. presented a novel connection between binary search trees (BSTs) and subsets of points on the plane. This connection was independently discovered by Der...
Kyle Fox
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 2 months ago
Adaptive Channel Recommendation for Dynamic Spectrum Access
—We propose a dynamic spectrum access scheme where secondary users recommend “good” channels to each other and access accordingly. We formulate the problem as an average rewa...
Xu Chen, Jianwei Huang, Husheng Li
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Towards Unbiased BFS Sampling
Abstract—Breadth First Search (BFS) is a widely used approach for sampling large unknown Internet topologies. Its main advantage over random walks and other exploration technique...
Maciej Kurant, Athina Markopoulou, Patrick Thiran
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Digraph description of k-interchange technique for optimization over permutations and adaptive algorithm system
The paper describes a general glance to the use of element exchange techniques for optimization over permutations. A multi-level description of problems is proposed which is a fund...
Mark Sh. Levin