Sciweavers

6047 search results - page 1043 / 1210
» Modeling with Extend
Sort
View
JCM
2008
101views more  JCM 2008»
15 years 3 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula
IJWMC
2006
100views more  IJWMC 2006»
15 years 3 months ago
A microscopic study of power management in IEEE 802.11 wireless networks
IEEE 802.11 power-save mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power manag...
Chunyu Hu, Rong Zheng, Jennifer C. Hou, Lui Sha
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
143
Voted
JSAT
2008
113views more  JSAT 2008»
15 years 3 months ago
Combining Adaptive and Dynamic Local Search for Satisfiability
In this paper we describe a stochastic local search (SLS) procedure for finding models of satisfiable propositional formulae. This new algorithm, gNovelty+ , draws on the features...
Duc Nghia Pham, John Thornton, Charles Gretton, Ab...
124
Voted
JCM
2006
73views more  JCM 2006»
15 years 3 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
« Prev « First page 1043 / 1210 Last » Next »