Sciweavers

11234 search results - page 1776 / 2247
» A Microsurgery Simulation System
Sort
View
TKDE
2010
272views more  TKDE 2010»
15 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
TMC
2010
119views more  TMC 2010»
15 years 3 months ago
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
—This paper proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the q...
Khaleel W. Mershad, Hassan Artail
VTC
2010
IEEE
138views Communications» more  VTC 2010»
15 years 3 months ago
Resource Allocation Scheme for Minimizing Uplink Interference in Hierarchical Cellular Networks
—Hierarchical cellular networks (HCNs), in which femtocells are deployed in the coverage of a conventional macrocell, offer a cost effective solution to achieve high user capacit...
Sung-Yeop Pyun, Dong-Ho Cho
ANTSW
2010
Springer
15 years 3 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
CODES
2010
IEEE
15 years 3 months ago
Exploring models of computation with ptolemy II
The Ptolemy project studies modeling, simulation, and design of concurrent, real-time, embedded systems. The focus is on assembly of concurrent components. The key underlying prin...
Christopher X. Brooks, Edward A. Lee, Stavros Trip...
« Prev « First page 1776 / 2247 Last » Next »