Sciweavers

539 search results - page 43 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
CISS
2008
IEEE
15 years 6 months ago
Imperfect randomized algorithms for the optimal control of wireless networks
Abstract— We consider a joint randomized scheduling, congestion control mechanism for general wireless networks. We allow for a set of imperfections in the operation of the rando...
Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah...
SIGIR
1996
ACM
15 years 4 months ago
Retrieval of Complex Objects Using a Four-Valued Logic
The aggregated structure of documents plays a key role in full-text, multimedia, and network Information Retrieval (IR). Considering aggregation provides new querying facilities a...
Thomas Rölleke, Norbert Fuhr
GLOBECOM
2008
IEEE
15 years 6 months ago
Foresighted Resource Reciprocation Strategies in P2P Networks
—We consider peer-to-peer (P2P) networks, where multiple peers are interested in sharing content. While sharing resources, autonomous and self-interested peers need to make decis...
Hyunggon Park, Mihaela van der Schaar
WINET
2010
147views more  WINET 2010»
14 years 10 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
COMPSAC
2002
IEEE
15 years 4 months ago
A Case Study of Dependable Software Upgrade with Distributed Components
Technology presented in the paper [1] allows validation of software architecture before component upgrades. This paper presents a case study of applying this method to the upgrade ...
J. Jenny Li, Xueshan Shan