Sciweavers

16128 search results - page 2861 / 3226
» Distributed network scheduling
Sort
View
ICPADS
2007
IEEE
15 years 10 months ago
Access point selection algorithms for maximizing throughputs in wireless LAN environment
In wireless LAN technology, access point selection at each station is a critical problem in order to obtain satisfactory throughputs. The current protocol for access point selecti...
Akihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamu...
ITNG
2007
IEEE
15 years 10 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
VTC
2007
IEEE
166views Communications» more  VTC 2007»
15 years 10 months ago
Analysis of Non-Saturation and Saturation Performance of IEEE 802.11 DCF in the Presence of Hidden Stations
—In this paper, we propose an analytical model to evaluate the hidden station effect on both non-saturation and saturation performance of the IEEE 802.11 Distributed Coordination...
Fu-Yi Hung, Ivan Marsic
COCOON
2007
Springer
15 years 10 months ago
On the Hardness of Optimization in Power Law Graphs
Our motivation for this work is the remarkable discovery that many large-scale real-world graphs ranging from Internet and World Wide Web to social and biological networks exhibit ...
Alessandro Ferrante, Gopal Pandurangan, Kihong Par...
DSOM
2007
Springer
15 years 10 months ago
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework
Abstract. Service Level Agreements (SLA) are needed to allow business interactions to rely on Internet services. Service Level Objectives (SLO) specify the committed performance le...
Hasan, Burkhard Stiller
« Prev « First page 2861 / 3226 Last » Next »