Sciweavers

20126 search results - page 3883 / 4026
» Timed Transition Systems
Sort
View
GRC
2007
IEEE
15 years 4 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 4 months ago
Modeling the Economic Cost of Transmission Bottlenecks
— The purpose of this paper is to model the stochastic behavior of nodal prices and use the predicted price differences between zones as the basis for measuring the magnitude and...
Timothy D. Mount, Jaeuk Ju
HPDC
2007
IEEE
15 years 4 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai
81
Voted
HPDC
2007
IEEE
15 years 4 months ago
Towards adaptive, scalable, and reliable resource provisioning for wsrf-compliant applications
Although WSRF (Web Services Resource Framework) and Java-based hosting environment have been successful in dealing with the heterogeneity of resources and the diversity of applica...
Eun-Kyu Byun, Jae-Wan Jang, Jin-Soo Kim
71
Voted
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand
« Prev « First page 3883 / 4026 Last » Next »