Sciweavers

1748 search results - page 336 / 350
» Security Models for Heterogeneous Networking
Sort
View
144
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
INFOCOM
2008
IEEE
15 years 9 months ago
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems
Abstract—Motivated by the increasing usage of wireless broadcast networks for multicast real-time applications like video, this paper considers a canonical real-time multicast sc...
Vivek Raghunathan, Vivek S. Borkar, Min Cao, P. R....
NOMS
2008
IEEE
15 years 9 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 9 months ago
Utility-Aware Resource Allocation for Multi-Stream Overlay Multicast
Abstract - Overlay multicast, which performs topology construction and data relaying in the application layer, has recently emerged as a promising vehicle for data distribution. In...
Ji Xu, Jiangchuan Liu, Hsiao-Hwa Chen, Xiao Chu
IJCNN
2007
IEEE
15 years 9 months ago
Robotic Architecture Inspired on Behavior Analysis
Learning by human tutelage means that a human being guides the attention of a robot or agent in order to teach it a given concept. This kind of learning is very important to devel...
Claudio A. Policastro, Roseli A. F. Romero, Giovan...