Sciweavers

8770 search results - page 1568 / 1754
» Named Service Networking
Sort
View
PERCOM
2008
ACM
15 years 5 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
WCNC
2008
IEEE
15 years 5 months ago
Three-Stage Serially Concatenated Codes and Iterative Center-Shifting K-Best Sphere Detection for SDM-OFDM: An EXIT Chart Aided
—Iterative K-best sphere detection (SD) and channel decoding is appealing, since it is capable of achieving a nearmaximum-a-posteriori (MAP) performance at a low complexity. Howe...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
ICNS
2007
IEEE
15 years 5 months ago
DRR-SFF: A Practical Scheduling Algorithm to Improve the Performance of Short Flows
— Short flow first scheduling (SFF) strategy is effective in obtaining more stringent performance bounds for short flows in Internet. However, previous strict SFF approaches i...
Changhua Sun, Lei Shi, Chengchen Hu, Bin Liu
ICNSC
2007
IEEE
15 years 5 months ago
Planning the Location of Intermodal Freight Hubs: an Agent Based Approach
—Intermodal freight transportation is defined as a system that carries freight from origin to destination by using two or more transportation modes. In this system, hubs are one ...
Koen H. van Dam, Zofia Verwater-Lukszo, Luis Ferre...
NDSS
2007
IEEE
15 years 5 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
« Prev « First page 1568 / 1754 Last » Next »