Sciweavers

1663 search results - page 173 / 333
» Scheduling techniques for media-on-demand
Sort
View
102
Voted
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 2 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
124
Voted
ADHOC
2007
159views more  ADHOC 2007»
15 years 29 days ago
Cross-layer adaptive control for wireless mesh networks
Abstract— This paper investigates optimal routing and adaptive scheduling in a wireless mesh network composed of mesh clients and mesh routers. The mesh clients are power constra...
Michael J. Neely, Rahul Urgaonkar
JUCS
2008
153views more  JUCS 2008»
15 years 24 days ago
Bus Network Optimization with a Time-Dependent Hybrid Algorithm
: This paper describes a new hybrid technique that combines a Greedy Randomized Adaptive Search Procedure (GRASP) and a genetic algorithm with simulation features in order to solve...
Ana C. Olivera, Mariano Frutos, Jessica Andrea Car...
124
Voted
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 22 days ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
106
Voted
COMCOM
2004
114views more  COMCOM 2004»
15 years 20 days ago
WFI optimized PWGPS for wireless IP networks
The worst-case fairness index (WFI) has proved to be an important metric in the provision of fairness and bounded delay in both wired and wireless networks. A feature of wireless l...
Fei Xiang, Alan Marshall, Junzhou Luo