Sciweavers

533 search results - page 79 / 107
» On security-aware transmission scheduling
Sort
View
HPDC
2006
IEEE
15 years 3 months ago
Optimal Bandwidth Sharing in Grid Environments
We consider the problem of bulk data transfers and bandwidth sharing in the context of grid infrastructures. Grid computing empowers high-performance computing in a large-scale di...
Loris Marchal, Pascale Vicat-Blanc Primet, Yves Ro...
SAINT
2003
IEEE
15 years 3 months ago
Virtual Collaboration Spaces: The EVE Community
An Educational Virtual Environment (EVE) is an instance of a Collaborative Virtual Environment (CVE), which focalises in providing collaborative, as well as educational, functiona...
Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiats...
IFIP
2003
Springer
15 years 2 months ago
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments
The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Konstantinos Oikonomou, Ioannis Stavrakakis
ICDCS
2010
IEEE
15 years 1 months ago
Publisher Placement Algorithms in Content-Based Publish/Subscribe
—Many publish/subscribe systems implement a policy for clients to join to their physically closest broker to minimize transmission delays incurred on the clients’ messages. How...
Alex King Yeung Cheung, Hans-Arno Jacobsen
AHSWN
2010
130views more  AHSWN 2010»
14 years 9 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li