Sciweavers

5234 search results - page 857 / 1047
» Simulation of Computer Network Attacks
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
Neural fuzzy call admission and rate controller for WCDMA cellular systems providing multirate services
The paper proposes a neural fuzzy call admission and rate controller (NFARC) scheme for WCDMA cellular systems providing multirate services. The NFARC scheme can guarantee the qua...
Chung-Ju Chang, Li-Chung Kuo, Yih-Shen Chen, Scott...
154
Voted
MOBIWAC
2006
ACM
15 years 10 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
AINA
2005
IEEE
15 years 9 months ago
A CAC Scheme for Multimedia Applications Based on Fuzzy Logic
The purpose of admission control is to support the Quality of Service (QoS) demands of real time applications via resource reservation. In order to deal with admission control for...
Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arj...
CCGRID
2005
IEEE
15 years 9 months ago
n-Cycle: a set of algorithms for task distribution on a commodity grid
— The global internet is rich in commodity resources but scarce in specialized resources. We argue that a grid framework can achieve better performance if it separates management...
Ladislau Bölöni, Damla Turgut, Dan C. Ma...
ICPP
2005
IEEE
15 years 9 months ago
Design and Implementation of Overlay Multicast Protocol for Multimedia Streaming
In this paper, we propose a new protocol called Shared Tree Streaming (or STS in short) protocol that is designed for interactive multimedia streaming applications. STS is a decen...
Thilmee M. Baduge, Akihito Hiromori, Hirozumi Yama...