Sciweavers

1584 search results - page 54 / 317
» Making priors a priority
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
Virtual Partitioning for Connection Admission Control in Cellular/WLAN Interworking
— Wireless wide area networks (WWANs) and wireless local area networks (WLANs) have complementary characteristics which make them suitable to jointly offer an ubiquitous wireless...
Enrique Stevens-Navarro, Vincent W. S. Wong
GLOBECOM
2007
IEEE
15 years 6 months ago
Efficient Queue Based Dynamic Bandwidth Allocation Scheme for Ethernet PONs
Abstract—We propose an Optical Line Terminal (OLT) centric Dynamic Bandwidth Allocation (DBA) scheme based on individual requests from service queues in Optical Network Units (ON...
Pallab K. Choudhury, Poompat Saengudomlert
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 6 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 6 months ago
TCP Compatible Greediness Control Algorithm for Wireless Multimedia Streaming
— This paper proposes a TCP compatible greediness control mechanism that tunes the greediness of the multimedia streaming process based on client priority, in order to make more ...
Edward Casey, Gabriel-Miro Muntean
RE
2007
Springer
15 years 6 months ago
Goal-Oriented Conceptual Database Design
We present details of a goal-oriented process for database requirements analysis. This process consists of a number of steps, spanning the spectrum from high-level stakeholder goa...
Lei Jiang, Thodoros Topaloglou, Alexander Borgida,...