Sciweavers

4795 search results - page 828 / 959
» The Message Classification Model
Sort
View
MMNS
2001
151views Multimedia» more  MMNS 2001»
14 years 11 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CCGRID
2010
IEEE
14 years 11 months ago
Region-Based Prefetch Techniques for Software Distributed Shared Memory Systems
Although shared memory programming models show good programmability compared to message passing programming models, their implementation by page-based software distributed shared m...
Jie Cai, Peter E. Strazdins, Alistair P. Rendell
CE
2008
122views more  CE 2008»
14 years 10 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
CORR
2010
Springer
182views Education» more  CORR 2010»
14 years 10 months ago
Fast Convergence of Natural Bargaining Dynamics in Exchange Networks
Bargaining networks model the behavior of a set of players who need to reach pairwise agreements for making profits. Nash bargaining solutions in this context correspond to soluti...
Yashodhan Kanoria, Mohsen Bayati, Christian Borgs,...
CORR
2008
Springer
73views Education» more  CORR 2008»
14 years 10 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus