Sciweavers

2947 search results - page 523 / 590
» The timely token protocol
Sort
View
JPDC
2007
191views more  JPDC 2007»
14 years 11 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
JUCS
2007
108views more  JUCS 2007»
14 years 11 months ago
On Pipelining Sequences of Data-Dependent Loops
: Sequences of data-dependent tasks, each one traversing large data sets, exist in many applications (such as video, image and signal processing applications). Those tasks usually ...
Rui Rodrigues, João M. P. Cardoso
TWC
2008
156views more  TWC 2008»
14 years 11 months ago
Dynamic Bandwidth Allocation for QoS Provisioning in IEEE 802.16 Networks with ARQ-SA
In this paper, bandwidth allocation, in terms of distributing available data slots among different users, is studied for QoS provisioning in IEEE 802.16 networks. By considering th...
Weiwei Wang, Zihua Guo, Xuemin Shen, Changjia Chen...
TWC
2008
119views more  TWC 2008»
14 years 11 months ago
Flow-level performance of opportunistic OFDM-TDMA and OFDMA networks
Abstract--In this paper, the flow-level performance of opportunistic scheduling in orthogonal frequency division multiplexing (OFDM) networks is studied. The analysis accounts for ...
Lei Lei, Chuang Lin, Jun Cai, Xuemin Shen
CERA
2004
89views more  CERA 2004»
14 years 11 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao