Sciweavers

1723 search results - page 278 / 345
» Predicting the Performance of IDA* using Conditional Distrib...
Sort
View
INFOCOM
2000
IEEE
15 years 8 months ago
Modeling TCP Latency
—Several analytic models describe the steady-state throughput of bulk transfer TCP flows as a function of round trip time and packet loss rate. These models describe flows base...
Neal Cardwell, Stefan Savage, Thomas E. Anderson
144
Voted
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 11 months ago
Robust Additively Coupled Games
We determine the robust Nash equilibrium (RNE) for a wide range of problems in communications systems and networks that are faced with uncertainty in their parameters’ values. T...
Saeedeh Parsaeefard, Ahmad R. Sharafat, Mihaela va...
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
ICDCS
2011
IEEE
14 years 3 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
MOBICOM
2010
ACM
15 years 4 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng