Sciweavers

897 search results - page 112 / 180
» Identity: How to name it, How to find it
Sort
View
WIOPT
2010
IEEE
15 years 2 hour ago
Low complexity algorithms for relay selection and power control in interference-limited environments
Abstract—We consider an interference-limited wireless network, where multiple source-destination pairs compete for the same pool of relay nodes. In an attempt to maximize the sum...
Lazaros Gkatzikis, Iordanis Koutsopoulos
IPAW
2010
14 years 11 months ago
Integrating Provenance Data from Distributed Workflow Systems with ProvManager
Abstract. Running scientific workflows in distributed environments is motivating the definition of provenance gathering approaches that are loosely coupled to the workflow executio...
Anderson Marinho, Leonardo Gresta Paulino Murta, C...
UM
2010
Springer
14 years 11 months ago
Inducing Effective Pedagogical Strategies Using Learning Context Features
Effective pedagogical strategies are important for e-learning environments. While it is assumed that an effective learning environment should craft and adapt its actions to the use...
Min Chi, Kurt VanLehn, Diane J. Litman, Pamela W. ...
WICON
2010
14 years 11 months ago
Optimized Content Caching and Request Capture in CNF Networks
In order to meet the overwhelming demands of content retrieval for mobile end users, a novel architecture for the next-generation Internet called Cache-and-Forward (CNF) has been p...
Lijun Dong, Dan Zhang, Yanyong Zhang, Dipankar Ray...
COORDINATION
2009
Springer
14 years 11 months ago
Automata for Context-Dependent Connectors
Abstract. Recent approaches to component-based software engineering employ coordinating connectors to compose components into software systems. For maximum flexibility and reuse, s...
Marcello M. Bonsangue, Dave Clarke, Alexandra Silv...