Sciweavers

253 search results - page 18 / 51
» Increasing the availability provided by RADIC with low overh...
Sort
View
ATAL
2007
Springer
15 years 2 months ago
Reputation in the joint venture game
In many settings, agents need to identify competent partners to assist them in accomplishing tasks. Direct experience may not provide sufficient data to learn the competence of ot...
Philip Hendrix, Barbara J. Grosz
GLOBECOM
2007
IEEE
15 years 4 months ago
Multi-Linked AODV Routing Protocol for Wireless Mesh Networks
Abstract— Nodes in multi-hop wireless networks, and specifically in ad-hoc and mesh networks, are being increasingly equipped with multiple wireless network interfaces (radios) o...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann
CN
2011
140views more  CN 2011»
14 years 2 months ago
Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures
Nowadays, data storage requirements from end-users are growing, demanding more capacity, more reliability and the capability to access information from anywhere. Cloud storage ser...
Lluis Pamies-Juarez, Pedro García Ló...
DATE
2006
IEEE
113views Hardware» more  DATE 2006»
15 years 4 months ago
Automatic ADL-based operand isolation for embedded processors
Cutting-edge applications of future embedded systems demand highest processor performance with low power consumption to get acceptable battery-life times. Therefore, low power opt...
Anupam Chattopadhyay, B. Geukes, David Kammler, Er...
MOBIQUITOUS
2005
IEEE
15 years 4 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy