Digital Ecosystem for Cross-domain Context Sensing and Trading
暂无分享,去创建一个
[1] Claudia Linnhoff-Popien,et al. Towards Realizing Global Scalability in Context-Aware Systems , 2005, LoCA.
[2] Piotr Wojdyllo,et al. Decorrelation of Wavelet Coefficients for Long-Range Dependent Processes , 2007, IEEE Transactions on Information Theory.
[3] Edmond A. Jonckheere,et al. Dynamic neural-based buffer management for queuing systems with self-similar characteristics , 2005, IEEE Transactions on Neural Networks.
[4] Tom Pfeifer. Synergetic positioning architecture for location-dependent services , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[5] Biplab Sikdar,et al. On the impact of IEEE 802.11 MAC on traffic characteristics , 2003, IEEE J. Sel. Areas Commun..
[6] Ilkka Norros,et al. Simulation of fractional Brownian motion with conditionalized random midpoint displacement , 1999 .
[7] Henk L. Muller,et al. Particle Filters for Position Sensing with Asynchronous Ultrasonic Beacons , 2006, LoCA.
[8] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[9] Walter Willinger,et al. Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.
[10] Aggelos Ioannou,et al. Pipelined heap (priority queue) management for advanced scheduling in high-speed networks , 2007, TNET.
[11] Jalal Almhana,et al. A long-range dependent model for Internet traffic with power transformation , 2006, IEEE Communications Letters.
[12] Huei-Wen Ferng,et al. Using priority, buffering, threshold control, and reservation techniques to improve channel-allocation schemes for the GPRS system , 2005, IEEE Trans. Veh. Technol..
[13] Jon Crowcroft,et al. Multicast-specific security threats and counter-measures , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[14] Michel Mandjes,et al. Large Deviations for Complex Buffer Architectures: The Short-Range Dependent Case , 2006 .
[15] Jane Yung-jen Hsu,et al. Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters , 2006, Pervasive.
[16] Tom Pfeifer. Redundant positioning architecture , 2005, Comput. Commun..
[17] Ozan K. Tonguz,et al. Dynamic priority queueing of handover calls in wireless networks: an analytical framework , 2004, IEEE Journal on Selected Areas in Communications.
[18] Christopher Metz,et al. On the Web: AAA Protocols: Authentication, Authorization, and Accounting for the Internet , 1999, IEEE Internet Comput..
[19] C. Watagodakumbura,et al. Aggregated priority queueing as an efficient queueing mechanism to overcome effects of self-similarity , 2004, The 6th International Conference on Advanced Communication Technology, 2004..
[20] Peter G. Harrison,et al. Delay analysis of priority queues with modulated traffic , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[21] Tho Le-Ngoc,et al. Priority queuing of long-range dependent traffic , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[22] Axel Küpper,et al. Quality of Context: What It Is And Why We Need It , 2004 .
[23] Abdelmadjid Bouabdallah,et al. Multicast receiver and sender access control and its applicability to mobile IP environments: a survey , 2005, IEEE Communications Surveys & Tutorials.
[24] Jie Yu,et al. Study of the Effect of the Wireless Gateway on Incoming Self-Similar Traffic , 2006, IEEE Transactions on Signal Processing.
[25] Patrick Robertson,et al. Context Modelling and Management in Ambient-Aware Pervasive Environments , 2005, LoCA.
[26] Marco Ajmone Marsan,et al. Markov models of internet traffic and a new hierarchical MMPP model , 2005, Comput. Commun..
[27] Ning Wang,et al. Scalable sender access control for bi-directional multicast routing , 2003, Comput. Networks.
[28] Ward Whitt,et al. Effective bandwidths with priorities , 1998, TNET.
[29] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.
[30] Ilkka Norros,et al. Priority queues with Gaussian input: a path-space approach to loss and delay asymptotics. , 2005 .
[31] Paul Lukowicz,et al. Evaluating Performance in Continuous Context Recognition Using Event-Driven Error Characterisation , 2006, LoCA.
[32] J. William Atwood,et al. A Framework to Add AAA Functionalities in IP Multicast , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[33] D. Wischik. Sample path large deviations for queues with many inputs , 2001 .
[34] J. William Atwood,et al. A Policy Framework for Multicast Group Control , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[35] Yang Xiao,et al. Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.
[36] Santosh Pande,et al. A Scalable Priority Queue Architecture for High Speed Network Processing , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[37] Mohamed Ould-Khaoua,et al. A performance model for wormhole-switched interconnection networks under self-similar traffic , 2004, IEEE Transactions on Computers.
[38] J. William Atwood,et al. The Internet Group Management Protocol with Access Control (IGMP-AC) , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[39] Norihiro Ishikawa,et al. An architecture for user authentication of IP multicast and its implementation , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).
[40] Ilkka Norros,et al. A most probable path approach to queueing systems with general Gaussian input , 2002, Comput. Networks.
[41] Ilkka Norros,et al. A storage model with self-similar input , 1994, Queueing Syst. Theory Appl..
[42] Mihaela van der Schaar,et al. Multi-user video streaming over multi-hop wireless networks: A distributed, cross-layer approach based on priority queuing , 2007, IEEE Journal on Selected Areas in Communications.
[43] Ilkka Norros,et al. Approximate formulae for Gaussian priority queues , 2001 .
[44] Junshan Zhang,et al. Multiple-access interference processes are self-similar in multimedia CDMA cellular networks , 2005, IEEE Transactions on Information Theory.
[45] N. Sulaiman. Performance Evaluation of Traffic Mix in IP Based Networks , 2007 .