Sciweavers

5966 search results - page 520 / 1194
» Distributed Caching Algorithms for Content Distribution Netw...
Sort
View
AP2PS
2009
IEEE
15 years 8 months ago
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
Thomas Roche, Mathieu Cunche, Jean-Louis Roch
BROADCOM
2008
IEEE
15 years 11 months ago
A Routing Metric and Algorithm for IEEE802.16 Mesh Networks
— The rapid growth of high-speed multimedia services for mobile, residential and small business customers has created an increasing demand for last mile broadband access. The wir...
Ntsibane Ntlatlapa
CODES
2010
IEEE
15 years 3 months ago
A greedy buffer allocation algorithm for power-aware communication in body sensor networks
Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. In spite of their potentials for many application domains,...
Hassan Ghasemzadeh, Roozbeh Jafari
SACMAT
2006
ACM
15 years 11 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
176
Voted
EMMCVPR
2003
Springer
15 years 10 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero