Sciweavers

1389 search results - page 177 / 278
» Predicting and Evaluating Distributed Communication Performa...
Sort
View
MSWIM
2004
ACM
15 years 9 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
TDSC
2011
14 years 11 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
152
Voted
PVM
2010
Springer
15 years 2 months ago
Adaptive MPI Multirail Tuning for Non-uniform Input/Output Access
Multicore processors have not only reintroduced Non-Uniform Memory Access (NUMA) architectures in nowadays parallel computers, but they are also responsible for non-uniform access ...
Stephanie Moreaud, Brice Goglin, Raymond Namyst
ICDCS
2005
IEEE
15 years 9 months ago
Systems Support for Pervasive Query Processing
Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applic...
Wenwei Xue, Qiong Luo, Lionel M. Ni
135
Voted
GLOBECOM
2007
IEEE
15 years 5 months ago
A SAGE Algorithm for Estimation of the Direction Power Spectrum of Individual Path Components
—In this contribution, the Fisher-Bingham-5 (FB5) probability density function (pdf) is used to model the shape of the direction power spectral density function (psdf) of individ...
Xuefeng Yin, Lingfeng Liu, Daniel K. Nielsen, Troe...