Sciweavers

1663 search results - page 293 / 333
» Verification and validation of simulation models
Sort
View
ICC
2009
IEEE
154views Communications» more  ICC 2009»
15 years 4 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
ICRA
2009
IEEE
154views Robotics» more  ICRA 2009»
15 years 4 months ago
On the complexity and consistency of UKF-based SLAM
— This paper addresses two key limitations of the unscented Kalman filter (UKF) when applied to the simultaneous localization and mapping (SLAM) problem: the cubic, in the numbe...
Guoquan Huang, Anastasios I. Mourikis, Stergios I....
INFOCOM
2009
IEEE
15 years 4 months ago
Distributed Power Allocation Algorithm for Spectrum Sharing Cognitive Radio Networks with QoS Guarantee
—In this paper we study the distributed multi-channel power allocation for spectrum sharing cognitive radio networks with QoS guarantee. We formulate this problem as a noncoopera...
Yuan Wu, Danny H. K. Tsang
ICISS
2009
Springer
15 years 4 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
GLOBECOM
2008
IEEE
15 years 4 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar