Sciweavers

3555 search results - page 552 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IJAMC
2010
94views more  IJAMC 2010»
15 years 2 months ago
Middleware mechanisms for interaction interoperability in Collaborative Virtual Environments
—In this paper, we discuss interaction interoperability in Collaborative Virtual Environments (CVE), intended to mean the ability of two or more users to cooperate despite the he...
Mario Ciampi, Luigi Gallo, Antonio Coronato, Giuse...
128
Voted
WCNC
2010
IEEE
15 years 2 months ago
Impact of Secondary Users' Field Size on Spectrum Sharing Opportunities
— Previous works studied the effect of many system parameters on spectrum sharing opportunities where secondary users access the spectrum of primary users. However, a parameter t...
Muhammad Aljuaid, Halim Yanikomeroglu
MOBIHOC
2010
ACM
15 years 1 months ago
Longest-queue-first scheduling under SINR interference model
We investigate the performance of longest-queue-first (LQF) scheduling (i.e., greedy maximal scheduling) for wireless networks under the SINR interference model. This interference...
Long Bao Le, Eytan Modiano, Changhee Joo, Ness B. ...
ICUMT
2009
15 years 1 months ago
Effective buffer and storage management in DTN nodes
Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, ...
Stylianos Dimitriou, Vassilis Tsaoussidis
149
Voted
TKDE
2010
149views more  TKDE 2010»
14 years 10 months ago
A Configurable Rete-OO Engine for Reasoning with Different Types of Imperfect Information
The RETE algorithm is a very efficient option for the development of a rule-based system, but it supports only boolean, first order logic. Many real-world contexts, instead, requir...
Davide Sottara, Paola Mello, Mark Proctor