Sciweavers

375 search results - page 42 / 75
» Accessible Capacity of Secondary Users
Sort
View
EMSOFT
2008
Springer
15 years 2 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
117
Voted
VTC
2010
IEEE
134views Communications» more  VTC 2010»
14 years 11 months ago
Wireless Schedulers with Future Sight via Real-Time 3D Environment Mapping
—This paper proposes a new wireless scheduling methodology which takes advantage of future predictions of data rate for the several users competing for physical access. Based on ...
Matthew Webb, Congzheng Han, Angela Doufexi, Mark ...
117
Voted
ADHOCNOW
2008
Springer
15 years 1 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
104
Voted
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 1 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
COMCOM
2008
104views more  COMCOM 2008»
15 years 2 days ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...