Sciweavers

2606 search results - page 57 / 522
» cost 2008
Sort
View
IADIS
2004
15 years 1 months ago
Fighting spam: motivating an account-based approach
Spam as unsolicited e-mail to a large number of recipients is known to become an increasingly disturbing and costly issue of electronic business and Internet traffic. Mainly techn...
Guido Schryen
COMCOM
2006
67views more  COMCOM 2006»
14 years 12 months ago
Performance analyses of three geography-based location strategies for PCS networks
Although many location schemes have been proposed and analyzed, the tradeoff among the location registration and the call delivery of different schemes and the relative performanc...
Wei Kuang Lai, Nian-Chin Wu
CN
2006
82views more  CN 2006»
14 years 12 months ago
Cross-sharing vs. self-sharing trees for protecting multicast sessions in mesh networks
In this study, we investigate a cost-effective approach for protecting several multicast sessions from any link failure in an optical network. The approach, referred to as cross-s...
Narendra K. Singhal, Canhui Ou, Biswanath Mukherje...
MANSCI
2008
89views more  MANSCI 2008»
14 years 11 months ago
Research Note - When Is Versioning Optimal for Information Goods?
This paper provides insights about when versioning is an optimal strategy for information goods. Our characterization of this class of goods is that variable costs are invariant w...
Hemant K. Bhargava, Vidyanand Choudhary
JCP
2008
99views more  JCP 2008»
14 years 11 months ago
Scheduling Algorithm with Potential Behaviors
Abstract--Scheduling algorithm for batch-mode dataintensive jobs is a key issue in data-intensive Grid applications. It focuses on how to minimize the overhead of transferring the ...
Jianhua Jiang, Huifang Ji, Gaochao Xu, Xiaohui Wei