Sciweavers

13180 search results - page 2352 / 2636
» Network Models
Sort
View
CN
2004
122views more  CN 2004»
15 years 4 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
SCHEDULING
2008
67views more  SCHEDULING 2008»
15 years 3 months ago
Exact train pathing
Suppose we are given a schedule of train movements over a rail network into which a new train is to be included. The origin and the destination are specified for the new train; it...
Viswanath Nagarajan, Abhiram G. Ranade
COMCOM
2010
95views more  COMCOM 2010»
15 years 3 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten
INFOCOM
2010
IEEE
15 years 2 months ago
Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs
—In IEEE 802.22 Wireless Regional Area Networks (WRANs), each Base Station (BS) solves a complex resource allocation problem of simultaneously determining the channel to reuse, p...
Hyoil Kim, Kang G. Shin
ISSRE
2010
IEEE
15 years 2 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
« Prev « First page 2352 / 2636 Last » Next »