Sciweavers

1040 search results - page 116 / 208
» Resource Usage Verification
Sort
View
JSW
2008
158views more  JSW 2008»
15 years 3 months ago
Hybrid Wireless Mesh Network with Application to Emergency Scenarios
Establishing and accessing a reliable communication infrastructure at crisis site is a challenging research problem. Failure in communication infrastructure and information exchang...
Raheleh B. Dilmaghani, Ramesh R. Rao
JPDC
2006
156views more  JPDC 2006»
15 years 3 months ago
Grid harvest service: A performance system of grid computing
Conventional performance evaluation mechanisms focus on dedicated systems. Grid computing infrastructure, on the other hand, is a shared collaborative environment constructed on v...
Ming Wu, Xian-He Sun
JSAC
2006
147views more  JSAC 2006»
15 years 3 months ago
Smart pay access control via incentive alignment
We use game theorectic models to show the lack of incentives in the TCP congestion avoidance algorithm and the consequential systemwide network problems. We then propose a Vickery-...
Jun Shu, Pravin Varaiya
ENTCS
2007
111views more  ENTCS 2007»
15 years 3 months ago
Multi Labelled Transition Systems: A Semantic Framework for Nominal Calculi
Action Labelled transition systems (LTS) have proved to be a fundamental model for describing and proving properties of concurrent systems. In this paper,Multiple Labelled Transit...
Rocco De Nicola, Michele Loreti
IJCAT
2007
100views more  IJCAT 2007»
15 years 3 months ago
INCA: qualitative reference framework for incentive mechanisms in P2P networks
: The existence of peer-to-peer networks is due to benefits brought by decentralisation of control and distribution of resources. It is expected that the usage of such networks wi...
Andrew Roczniak, Abdulmotaleb El-Saddik, Pierre L&...