Sciweavers

4511 search results - page 737 / 903
» Observation Based System Security
Sort
View
ENC
2008
IEEE
15 years 10 months ago
Adaptively Brokering Continuous Queries for Exploiting Streams
This paper introduces an approach for adaptively brokering queries for exploiting streams produced and consumed by devices with limited computing and storage capacities. Such devi...
José-Luis Zechinelli-Martini, Thierry Delot...
HASE
2008
IEEE
15 years 10 months ago
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R...
158
Voted
VTC
2008
IEEE
142views Communications» more  VTC 2008»
15 years 10 months ago
Fairness Assessment of the Adaptive Token Bank Fair Queuing Scheduling Algorithm
Abstract—Adaptive Token Bank Fair Queuing (ATBFQ) algorithm has been proposed as a cross-layer scheduling technique for 4G wireless systems recently. This algorithm takes higher ...
Feroz A. Bokhari, Halim Yanikomeroglu, William K. ...
CEC
2007
IEEE
15 years 9 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers
133
Voted
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 9 months ago
A Theoretical Perspective on Effective Interorganizational Knowledge
Interorganizational knowledge sharing is critical to knowledge intensive collaborations between organizations. Despite a proliferation of literature on knowledge sharing, most stu...
Nongkran Lertpittayapoom, Souren Paul, Peter P. My...