Sciweavers

830 search results - page 142 / 166
» Pricing-Based Control of Large Networks
Sort
View
AH
2008
Springer
15 years 4 months ago
A Scrutable User Modelling Infrastructure for Enabling Life-Long User Modelling
User Modelling is the core component for the majority of personalisation systems. By keeping a model for every user, a system can successfully personalise its content and utilise a...
Demetris Kyriacou
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 4 months ago
Turbo Codes Based Image Transmission for Channels with Both Random Errors and Packet Loss
Abstract— In this paper, we propose an unequal error protection (UEP) framework for progressive image transmission over wireless networks with both random errors and packet loss....
Lei Yao, Lei Cao
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 4 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
MSS
2007
IEEE
86views Hardware» more  MSS 2007»
15 years 3 months ago
RAIF: Redundant Array of Independent Filesystems
Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not suppo...
Nikolai Joukov, Arun M. Krishnakumar, Chaitanya Pa...
ESORICS
2007
Springer
15 years 3 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...