Sciweavers

3994 search results - page 695 / 799
» Supporting the design of network-spanning applications
Sort
View
FSTTCS
2010
Springer
14 years 11 months ago
Minimizing Busy Time in Multiple Machine Real-time Scheduling
We consider the following fundamental scheduling problem. The input consists of n jobs to be scheduled on a set of machines of bounded capacities. Each job is associated with a re...
Rohit Khandekar, Baruch Schieber, Hadas Shachnai, ...
IMC
2010
ACM
14 years 11 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
CIKM
2011
Springer
14 years 1 months ago
Keyword search over RDF graphs
Large knowledge bases consisting of entities and relationships between them have become vital sources of information for many applications. Most of these knowledge bases adopt the...
Shady Elbassuoni, Roi Blanco
HOST
2011
IEEE
14 years 1 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
NETWORK
2008
150views more  NETWORK 2008»
15 years 1 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu