Sciweavers

1040 search results - page 122 / 208
» Resource Usage Verification
Sort
View
104
Voted
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 9 months ago
Improving TCP Goodput in 802.11 Access Networks
— The widespread deployment of the IEEE 802.11 protocol has made it the de facto standard for wireless network access and allows Internet users to move freely (at least within a ...
Long Le, Sahin Albayrak, Muslim Elkotob, Ahmet Cih...
136
Voted
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
15 years 9 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
109
Voted
RTCSA
2007
IEEE
15 years 9 months ago
Virtual Full Replication by Adaptive Segmentation
We propose Virtual Full Replication by Adaptive segmentation (ViFuR-A), and evaluate its ability to maintain scalability in a replicated real-time database. With full replication ...
Gunnar Mathiason, Sten F. Andler, Sang Hyuk Son
ACCV
2007
Springer
15 years 9 months ago
Flea, Do You Remember Me?
The ability to detect and recognize individuals is essential for an autonomous robot interacting with humans even if computational resources are usually rather limited. In general ...
Michael Grabner, Helmut Grabner, Joachim Pehserl, ...
DALT
2007
Springer
15 years 9 months ago
Towards Alternative Approaches to Reasoning About Goals
Agent-oriented programming languages have gone a long way in the level of sophistication offered to programmers, and there has also been much progress in tools to support multi-ag...
Patricia H. Shaw, Rafael H. Bordini