Sciweavers

533 search results - page 83 / 107
» On security-aware transmission scheduling
Sort
View
HICSS
1998
IEEE
140views Biometrics» more  HICSS 1998»
15 years 1 months ago
A Multi-Agent Approach to the Deregulation and Restructuring of Power Industry
In recent years, electric utility industry in the whole world has been facing pressure to be deregulated or restructured in order to increase its efficiency, to reduce operational...
Felix F. Wu, Chris Yeung, Ada Poon, Jerome Yen
3DPVT
2004
IEEE
107views Visualization» more  3DPVT 2004»
15 years 1 months ago
An Easy Viewer for Out-of-Core Visualization of Huge Point-Sampled Models
In this paper, we propose a viewer for huge point-sampled models by combining out-of-core technologies with view-dependent level-of-detail (LOD) control. This viewer is designed o...
Fang Meng, Hongbin Zha
81
Voted
RTAS
1995
IEEE
15 years 1 months ago
Design and evaluation of a window-consistent replication service
—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time gu...
Ashish Mehra, Jennifer Rexford, Hock-Siong Ang, Fa...
69
Voted
SODA
2004
ACM
98views Algorithms» more  SODA 2004»
14 years 11 months ago
End-to-end packet-scheduling in wireless ad-hoc networks
Abstract Packet-scheduling is a particular challenge in wireless networks due to interference from nearby transmissions. A distance-2 interference model serves as a useful abstract...
V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Pa...
INFOCOM
2011
IEEE
14 years 1 months ago
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints
— We consider a peer-to-peer network where nodes can send and receive files amongst their peers. File requests are generated randomly, and each new file can correspond to a dif...
Michael J. Neely, Leana Golubchik