Sciweavers

559 search results - page 93 / 112
» Constraint-Based Deployment of Distributed Components in a D...
Sort
View
124
Voted
MOBIHOC
2008
ACM
16 years 1 days ago
Efficient binary schemes for training heterogeneous sensor and actor networks
Sensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users ? called actors ? with real-time information in...
Ferruccio Barsi, Alfredo Navarra, Maria Cristina P...
MOBICOM
2010
ACM
15 years 19 days ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
SASO
2007
IEEE
15 years 6 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
IDEAS
2003
IEEE
102views Database» more  IDEAS 2003»
15 years 5 months ago
Pushing Quality of Service Information and Requirements into Global Query Optimization
In recent years, a lot of research effort has been dedicated to the management of Quality of Service (QoS), mainly in the fields of telecommunication networks and multimedia syste...
Haiwei Ye, Brigitte Kerhervé, Gregor von Bo...
WORDS
2005
IEEE
15 years 6 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...