Sciweavers

2454 search results - page 285 / 491
» Privacy in the Information and Communications Technologies
Sort
View
124
Voted
CISS
2007
IEEE
15 years 1 months ago
Robust Routing in Wireless Multi-Hop Networks
This paper introduces a robust approach to stochastic multi-hop routing for wireless networks when the quality of links is modelled through a reliability matrix R. Yielding to the ...
Yuchen Wu, Alejandro Ribeiro, Georgios B. Giannaki...
IIE
2006
110views more  IIE 2006»
15 years 1 months ago
The Current Situation of Informatics Education in Mongolia
Mongolia started using Information and Communication Technology (ICT) in secondary education relatively late. The computer training and informatics has been included as a subject i...
Uyanga Sambuu
EJC
2010
14 years 8 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
109
Voted
CISS
2010
IEEE
14 years 5 months ago
Transmission completion time minimization in an energy harvesting system
Abstract—We consider the transmission completion time minimization problem in a single-user energy harvesting wireless communication system. In this system, both the data packets...
Jing Yang, Sennur Ulukus
ICDIM
2009
IEEE
15 years 8 months ago
A new hybrid schema-sharing technique for multitenant applications
This paper presents a new schema-sharing technique for multitenant applications. Our approach is built on top of the Extension table method and makes use of the native XML data su...
Franclin S. Foping, Ioannis M. Dokas, John Feehan,...