Sciweavers

5518 search results - page 1016 / 1104
» Rule-Based Service Modeling
Sort
View
INFOCOM
2010
IEEE
14 years 12 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
INFOCOM
2010
IEEE
14 years 12 months ago
Joint Random Access and Power Selection for Maximal Throughput in Wireless Networks
—In wireless networks, how to select transmit power that maximizes throughput is a challenging problem. On one hand, transmissions at a high power level could increase interferen...
Yan Gao, Zheng Zeng, P. R. Kumar
INFOCOM
2010
IEEE
14 years 12 months ago
Wireless Network Virtualization as A Sequential Auction Game
—We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives...
Fangwen Fu, Ulas C. Kozat
JSAC
2010
194views more  JSAC 2010»
14 years 12 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
JTAER
2010
173views more  JTAER 2010»
14 years 12 months ago
An Assessment of Design Patterns' Influence on a Java-based E-Commerce Application
Design patterns, acting as recurring solutions to common problems, offer significant benefits such as avoiding unnecessary complexity, and promoting code reuse, maintainability an...
Maria Mouratidou, Vassilios Lourdas, Alexander Cha...
« Prev « First page 1016 / 1104 Last » Next »