Sciweavers

8655 search results - page 1281 / 1731
» Challenges for Trusted Computing
Sort
View
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 11 months ago
An Approximation Algorithm for Minimum-Delay Peer-to-Peer Streaming
Peer-to-peer (P2P) technology provides a scalable solution in multimedia streaming. Many streaming applications, such as IPTV and video conferencing, have rigorous constraints on ...
Fei Huang, Binoy Ravindran, Anil Vullikanti
QSHINE
2009
IEEE
15 years 11 months ago
Cooperative Training in Wireless Sensor and Actor Networks
Exploiting features of high density wireless sensor networks represents a challenging issue. In this work, the training of a sensor network which consists of anonymous and asynchro...
Francesco Betti Sorbelli, Roberto Ciotti, Alfredo ...
RTCSA
2009
IEEE
15 years 11 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
RTSS
2009
IEEE
15 years 11 months ago
Integrating Proactive and Reactive Approaches for Robust Real-Time Data Services
— Real-time data services are needed in data-intensive real-time applications such as e-commerce or traffic control. However, it is challenging to support real-time data service...
Yan Zhou, Kyoung-Don Kang
IEEECIT
2009
IEEE
15 years 11 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
« Prev « First page 1281 / 1731 Last » Next »