Sciweavers

1723 search results - page 290 / 345
» Predicting the Performance of IDA* using Conditional Distrib...
Sort
View
157
Voted
JSAC
2011
137views more  JSAC 2011»
14 years 10 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
117
Voted
ICS
2010
Tsinghua U.
16 years 1 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
ICSOC
2007
Springer
15 years 10 months ago
Service License Composition and Compatibility Analysis
Services enable the transformation of the World Wide Web as distributed interoperable systems interacting beyond organizational boundaries. Service licensing enables broader usage ...
G. R. Gangadharan, Michael Weiss, Vincenzo D'Andre...
116
Voted
IRREGULAR
1997
Springer
15 years 8 months ago
Programming with Shared Data Abstractions
ing with shared data abstractions Simon Dobson1 and Don Goodeve2 1 Well-Founded Systems Unit, CLRC Rutherford Appleton Laboratory, UK 2 School of Computer Studies, University of Le...
Simon A. Dobson, Don Goodeve
112
Voted
MASCOTS
2003
15 years 5 months ago
Quantifying the Properties of SRPT Scheduling
This paper uses a probe-based sampling approach to study the behavioural properties of Web server scheduling strategies, such as Processor Sharing (PS) and Shortest Remaining Proc...
Mingwei Gong, Carey L. Williamson