Sciweavers

5723 search results - page 1009 / 1145
» Network Management
Sort
View
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
15 years 10 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
DCC
2008
IEEE
15 years 10 months ago
Shared Descriptions Fusion Coding for Storage and Selective Retrieval of Correlated Sources
Motivated by sensor networks, we consider the fusion storage of correlated sources in a database, such that any subset of them may be efficiently retrieved in the future. Only st...
Sharadh Ramaswamy, Kenneth Rose
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 10 months ago
Semi-Blind Power Allocation for Digital Subscriber Lines
— Digital subscriber lines (DSL) are today one of the most important means for delivering high-speed data transmission. An emerging technique for dealing with one of the technolo...
Rodrigo Moraes, Boris Dortschy, Aldebaro Klautau, ...
ICDCS
2008
IEEE
15 years 10 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICDCSW
2008
IEEE
15 years 10 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
« Prev « First page 1009 / 1145 Last » Next »