Sciweavers

1829 search results - page 361 / 366
» Distributed loop-scheduling schemes for heterogeneous comput...
Sort
View
TIFS
2010
186views more  TIFS 2010»
14 years 7 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
MOBIHOC
2003
ACM
15 years 9 months ago
The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way)
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizi...
Tara Small, Zygmunt J. Haas
EUROPAR
2005
Springer
15 years 2 months ago
Hierarchical Scheduling for Moldable Tasks
The model of moldable task (MT) was introduced some years ago and has been proved to be an efficient way for implementing parallel applications. It considers a target application ...
Pierre-François Dutot
TMI
1998
137views more  TMI 1998»
14 years 9 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
IPSN
2010
Springer
15 years 4 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...