Sciweavers

2912 search results - page 424 / 583
» Overlay Networks - Implementation by Specification
Sort
View
AIPS
1996
15 years 6 months ago
Least-Commitment Action Selection
The principle of least commitment was embraced early in planning research. Hierarchical task networks (HTNs)reason about high-level tasks without committing to specific low-level ...
Marc Friedman, Daniel S. Weld
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JNW
2008
139views more  JNW 2008»
15 years 4 months ago
Large-Scale RTCP Feedback Optimization
Nowadays, multimedia streaming is a common service on the Internet including both fixed and mobile networks. The RTP protocol is usually used to transfer the media. The RTCP protoc...
Vit Novotny, Dan Komosny
JUCS
2008
155views more  JUCS 2008»
15 years 4 months ago
Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games
Abstract: Nowadays, in the markets of broadband access services, traditional contracts are of "static" type. Customers buy the right to use a specific amount of resources...
Sergios Soursos, Costas Courcoubetis, Richard R. W...
PE
2008
Springer
113views Optimization» more  PE 2008»
15 years 4 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi