Search
Now showing items 11-20 of 1033
Wireless Multicast Cross-Layer Framework for Rate
(
IEEE
, 2009 , Article)
Multicast-based data communication is an efficient communication scheme especially in multihop ad hoc networks where the MAC layer is based on one-hop broadcast from one source to multiple receivers. In this paper, we ...
Q-Map Application for Enrichment of a Mobile Directory Assistance Service
(
NCCIT 2010
, 2010 , Article)
The project described in this paper involves designing and developing a mobile map application, called the Qatar Map (Q-Map), which supports a telephone directory assistance service that runs over the terrestrial cellular ...
Characteristics of agent-based hierarchical diff-EDF schedulability over heterogeneous real-time Packet networks
(
EuroJournals Publishing, Inc.
, 2009 , Article)
Packet networks are currently enabling the integration of heterogeneous traffic with a wide range of characteristics that extend from video traffic with stringent QoS requirements to best-effort traffic requiring no ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
Infrared Image Enhancement using H{infinity} Bounds for Surveillance Applications
(
IEEE
, 2008 , Article)
In this paper, two algorithms have been presented to enhance the infrared (IR) images. Using the autoregressive moving average model structure and Hinfin optimal bounds, the image pixels are mapped from the IR pixel space ...
Efficient Channel Allocation Scheme with Triangle Communication
(
IEEE
, 2009 , Article)
Radio is a valuable resource for wireless/mobile communication systems. In this paper, we present an efficient algorithm using a novel triangle communication model to synchronize processes effectively by searching for free ...
MASACAD: a multiagent based approach to information customization
(
IEEE
, 2006 , Article)
MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ...