Sciweavers

63 search results - page 4 / 13
» Investigating user account control practices
Sort
View
NETWORK
2006
218views more  NETWORK 2006»
13 years 6 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
TWC
2008
225views more  TWC 2008»
13 years 6 months ago
Joint rate and power allocation for cognitive radios in dynamic spectrum access environment
Abstract--We investigate the dynamic spectrum sharing problem among primary and secondary users in a cognitive radio network. We consider the scenario where primary users exhibit o...
Dong In Kim, Long Le, Ekram Hossain
IEAAIE
2010
Springer
13 years 4 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
VLDB
1990
ACM
101views Database» more  VLDB 1990»
13 years 10 months ago
Non-Monotonic Knowledge Evolution in VLKDBs
Non-monotonic knowledge evolutions and exceptions constitute a complex theoritical and practical problem. The state of the art shows a rich and surprising diversity of approaches....
Christian Esculier
EURONGI
2004
Springer
13 years 11 months ago
Admission Control in the Downlink of WCDMA/UMTS
In this paper, we develop a novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems. We ï¬...
Salah-Eddine Elayoubi, Tijani Chahed