Sciweavers

2846 search results - page 503 / 570
» Personalization of a Trust Network
Sort
View
MTA
2008
132views more  MTA 2008»
15 years 15 days ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 14 days ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
127
Voted
SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
15 years 14 days ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...
120
Voted
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
15 years 14 days ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
107
Voted
TOCS
2008
131views more  TOCS 2008»
15 years 13 days ago
A generic component model for building systems software
Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...