Sciweavers

19130 search results - page 3801 / 3826
» Modelling multi-path problems
Sort
View
TMC
2008
138views more  TMC 2008»
14 years 9 months ago
Airtime Fairness for IEEE 802.11 Multirate Networks
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min through...
Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dhar...
TOG
2008
239views more  TOG 2008»
14 years 9 months ago
Skeleton extraction by mesh contraction
eleton is a very useful 1D structure to abstract the geometry and topology of a 3D object. Extraction of curve-skeletons is a fundamental problem in computer graphics, visualizatio...
Oscar Kin-Chung Au, Chiew-Lan Tai, Hung-Kuo Chu, D...
TPDS
2008
118views more  TPDS 2008»
14 years 9 months ago
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe Wenjie Jiang, Dah-Ming Chiu, Jo...
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JSA
2007
191views more  JSA 2007»
14 years 9 months ago
Automated memory-aware application distribution for Multi-processor System-on-Chips
Mapping of applications on a Multiprocessor System-on-Chip (MP-SoC) is a crucial step to optimize performance, energy and memory constraints at the same time. The problem is formu...
Heikki Orsila, Tero Kangas, Erno Salminen, Timo D....
« Prev « First page 3801 / 3826 Last » Next »