Sciweavers

948 search results - page 125 / 190
» Analysis of SITA policies
Sort
View
CN
2007
168views more  CN 2007»
14 years 12 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
QUESTA
2010
112views more  QUESTA 2010»
14 years 10 months ago
Admission control for a multi-server queue with abandonment
In a M/M/N+M queue, when there are many customers waiting, it may be preferable to reject a new arrival rather than risk that arrival later abandoning without receiving service. O...
Yasar Levent Koçaga, Amy R. Ward

Publication
145views
16 years 10 months ago
Segmenting Preferences and Habits of Transit Users and Non-Users
Ridership is a key goal in the transit industry. Conventional transit analysis focuses on two types of users—captive and choice riders—but rarely aims to understand the prefe...
Kevin J. Krizek, Ahmed El-Geneidy
CSE
2009
IEEE
15 years 6 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 6 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo