Sciweavers

1057 search results - page 131 / 212
» Peer-to-Peer utility maximization
Sort
View
HYBRID
2010
Springer
15 years 4 months ago
On a control algorithm for time-varying processor availability
We consider an anytime control algorithm for the situation when the processor resource availability is time-varying. The basic idea is to calculate the components of the control i...
Vijay Gupta
ICDE
2009
IEEE
145views Database» more  ICDE 2009»
15 years 4 months ago
Context-Aware Object Connection Discovery in Large Graphs
— Given a large graph and a set of objects, the task of object connection discovery is to find a subgraph that retains the best connection between the objects. Object connection...
James Cheng, Yiping Ke, Wilfred Ng, Jeffrey Xu Yu
CCS
2009
ACM
15 years 4 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
GLOBECOM
2009
IEEE
15 years 4 months ago
Cognitive Radio Enhancements for Legacy Networks Using Cooperative Diversity
Abstract— Two driving goals for cognitive radio (CR) technique are maximizing spectrum utilization and avoiding interference to primary users. In this paper, we deal with the CR ...
Zhanwei Sun, Ioannis Krikidis, J. Nicholas Laneman...
ICC
2009
IEEE
196views Communications» more  ICC 2009»
15 years 4 months ago
Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks
This work extends the existing static framework for joint flow control, routing and medium access control (MAC) in random access multi-hop wireless networks to a dynamic framewor...
Sucha Supittayapornpong, Poompat Saengudomlert