Sciweavers

375 search results - page 42 / 75
» Accessible Capacity of Secondary Users
Sort
View
88
Voted
EMSOFT
2008
Springer
15 years 20 hour ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
VTC
2010
IEEE
134views Communications» more  VTC 2010»
14 years 8 months ago
Wireless Schedulers with Future Sight via Real-Time 3D Environment Mapping
—This paper proposes a new wireless scheduling methodology which takes advantage of future predictions of data rate for the several users competing for physical access. Based on ...
Matthew Webb, Congzheng Han, Angela Doufexi, Mark ...
93
Voted
ADHOCNOW
2008
Springer
14 years 11 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
83
Voted
DBSEC
2007
128views Database» more  DBSEC 2007»
14 years 11 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
102
Voted
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...